In my last post, โIntroduction to Web Apps with Next.jsโ, we went through the steps of setting up a new Next.js project, customizing a landing page, and implementing a very simple web application. In this post, weโll implement an Open Authentication (OAuth) based Single Sign-On (SSO) API within Next.js using NextAuth.js. Weโll be using GitHub as our provider, but the steps here are very similar for other platforms, such as Google or Discord. This will allow us to place portions of our website behind a login screen, restricting access to certain content or APIs for anonymous visitors.
Achieving Effective API Test Coverage: Best Practices and Tools
Test coverage is a metric that measures how much of your codebase is exercised by tests, providing insight into the effectiveness of your testing efforts. In this blog, weโll focus on API projects, exploring the types of tests suited for code coverage, realistic goals (and tools to help achieve them), and the minimum coverage needed to reap the benefits of your tests.
Testing your codeโdown to individual linesโis a critical practice in modern software development. It helps ensure applications remain reliable, stable, and maintainable, all while balancing practical constraints.
Modernizing Cobol Applications
The world of technology is constantly evolving, but despite the rise of cutting-edge programming languages and modern software frameworks, COBOL applications continue to play a critical role in the business world. COBOL, one of the oldest programming languages, still powers many of the core systems of industries like banking, insurance, and government. Why, then, are businesses increasingly considering modernizing COBOL …
SBOMs: A Recipe for Software Success
While working with a client a few years ago, I was introduced to the concept of a Software Bill of Materials, colloquially known as an SBOM. It didnโt take long before I recognized its immense value and importance in improving security and integrity in software development. Hopefully, over the next few minutes as you read this blog, youโll start to see that as well.
The topic of SBOMs has become more and more popular over the past several years and is increasingly critical in this technology-driven world. Weโve all heard of numerous enterprise-level data attacks, exposures, and leaks in recent years, and almost all are caused by some sort of security vulnerability. Many of these incidents could have been realized and possibly even mitigated before disaster struck if an SBOM had been in play.
Nacha ACH Payroll: How Getting Paid Works
Getting paid is nice! Most people enjoy seeing their bank account balance increase after a period of hard work. But have you ever wondered how your paycheck actually gets deposited into your bank account?
In this blog, weโll explore how a basic payroll or direct deposit processing system ingests an incoming Nacha ACH file. This will give you a clearer picture of how your hard-earned money gets from your employer to you.




