Chapters 
 Transcript 
 Episode notes 
 1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18 
 Introduction 
 00:00 • 5min 
 Are You Like Bootstrapped? 
 04:36 • 4min 
 How Does Cloud Flares Bot Detection Work? 
 08:58 • 2min 
 Cloud Flare Doesn't Leak a Bot Detection 
 10:50 • 5min 
 How to Bypass IP Based Rate Limitation 
 16:18 • 2min 
 How to Deal With a Bounce Rate Not Coming Through Subset of Ip Addresses 
 18:39 • 4min 
 Using a Vulnerability Management Tool for Elixir 
 22:20 • 2min 
 Docker Deep Dive Book Club 
 24:44 • 2min 
 Elixir Confidence - It's Awesome 
 26:34 • 5min 
 Erlang Security Guidelines 
 31:16 • 2min 
 Using a Plug Attack Is a Good Idea 
 33:34 • 3min 
 Peroxial Data Privacy 
 36:24 • 4min 
 Elixir Shared Access to a Large Chunk of Memory 
 40:00 • 3min 
 Using Persistent Term in an Application 
 43:26 • 4min 
 Using a Parek Seal Agent for a Cloud Ip Speed Provider 
 47:13 • 3min 
 Is Crack Seal a Competitive Advantage for Your Business? 
 49:49 • 2min 
 Persistent Term Depends on Perxial Ios Uptime 
 51:41 • 4min 
 What Are Your Picks for This Week? 
 55:51 • 7min 


