Forem

GigAHerZ profile picture

GigAHerZ

Silent architect of digital realms, crafting realities with code and weaving intricate tapestries where dreams and destinies unfold.

Building Composable RLS: Enterprise Data Security on Autopilot
Cover image for Building Composable RLS: Enterprise Data Security on Autopilot

Building Composable RLS: Enterprise Data Security on Autopilot

2
Comments
2 min read

Want to connect with GigAHerZ?

Create an account to connect with GigAHerZ. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
ByteAether.Ulid 1.3.2: .NET 10 Support, C# 14's Field, and Engineering Zero-Overhead IDs
Cover image for ByteAether.Ulid 1.3.2: .NET 10 Support, C# 14's Field, and Engineering Zero-Overhead IDs

ByteAether.Ulid 1.3.2: .NET 10 Support, C# 14's Field, and Engineering Zero-Overhead IDs

2
Comments
2 min read
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
Cover image for Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

3
Comments
2 min read
Enterprise Data Access: Fully Automated Soft-Delete
Cover image for Enterprise Data Access: Fully Automated Soft-Delete

Enterprise Data Access: Fully Automated Soft-Delete

3
Comments
2 min read
Building an Enterprise DAL: Automated Auditing for Data Integrity
Cover image for Building an Enterprise DAL: Automated Auditing for Data Integrity

Building an Enterprise DAL: Automated Auditing for Data Integrity

7
Comments
2 min read
Building the Enterprise DAL: Database Structure and ULIDs
Cover image for Building the Enterprise DAL: Database Structure and ULIDs

Building the Enterprise DAL: Database Structure and ULIDs

1
Comments
2 min read
ByteAether.Ulid v1.3.0: Enhanced ULID Generation Control and Security
Cover image for ByteAether.Ulid v1.3.0: Enhanced ULID Generation Control and Security

ByteAether.Ulid v1.3.0: Enhanced ULID Generation Control and Security

Comments
3 min read
⏱ When Milliseconds Aren't Enough: A Pragmatic Take on ULID Overflow
Cover image for ⏱ When Milliseconds Aren't Enough: A Pragmatic Take on ULID Overflow

⏱ When Milliseconds Aren't Enough: A Pragmatic Take on ULID Overflow

5
Comments
2 min read
📝 Transforming HTTP API Design with the HyperAction API Approach
Cover image for 📝 Transforming HTTP API Design with the HyperAction API Approach

📝 Transforming HTTP API Design with the HyperAction API Approach

1
Comments
4 min read
🖇️ Smart Event Handling in .NET: Weak References & Pub-Sub Explained
Cover image for 🖇️ Smart Event Handling in .NET: Weak References & Pub-Sub Explained

🖇️ Smart Event Handling in .NET: Weak References & Pub-Sub Explained

4
Comments
2 min read
⚡ QueryLink - Streamlining Frontend-Backend Data Integration in .NET Applications
Cover image for ⚡ QueryLink - Streamlining Frontend-Backend Data Integration in .NET Applications

⚡ QueryLink - Streamlining Frontend-Backend Data Integration in .NET Applications

3
Comments
2 min read
🔥 ULIDs: The Better Default for Modern Systems – Lessons from Shopify
Cover image for 🔥 ULIDs: The Better Default for Modern Systems – Lessons from Shopify

🔥 ULIDs: The Better Default for Modern Systems – Lessons from Shopify

1
Comments
3 min read
🧩 UUID vs ULID vs Integer IDs: A Technical Guide for Modern Systems
Cover image for 🧩 UUID vs ULID vs Integer IDs: A Technical Guide for Modern Systems

🧩 UUID vs ULID vs Integer IDs: A Technical Guide for Modern Systems

2
Comments
2 min read
🔍 ULIDs: A Modern Identifier for Distributed Systems
Cover image for 🔍 ULIDs: A Modern Identifier for Distributed Systems

🔍 ULIDs: A Modern Identifier for Distributed Systems

3
Comments 2
3 min read
loading...