![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_typescript_academy_95a9b986a9/medium_typescript_academy_95a9b986a9.png)
Ackee writes a blog
Are you interested in our work? We publish posts that keep readers up to date with the technologies we utilize, as well as what we’ve found to be good and bad for use. We believe that promoting maximal transparency is vital to both our clients as well as others in the tech community.
- 5 years of Ackee
- Android
- Backend
- Blockchain
- Crypto
- Design
- Development
- DevOps
- iOS
- Lectures
- Life in Ackee
- Mobile apps
- Nette
- Press Release
- Products
- Projects
- Reports
- Testing
- Uncategorized
- UX
- Web
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_typescript_academy_95a9b986a9/medium_typescript_academy_95a9b986a9.png)
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_web3_9baac6be6b/medium_web3_9baac6be6b.png)
Web3: How to Test Frontend Applications?
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_blog_universal_yellow_770c59e673/medium_blog_universal_yellow_770c59e673.png)
Google Cloud Monitoring Log-based Metrics and the Misunderstood resource.type
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_k6_dc0f2b5e3c/medium_k6_dc0f2b5e3c.png)
How to Use K6 for Load Testing IAP Protected Sites?
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_google_vault_31f9c69619/medium_google_vault_31f9c69619.png)
Vault Google Workspace Authorization with OIDC Auth Method
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_prometheus_2f36916d98/medium_prometheus_2f36916d98.png)
Prometheus Metrics Scraping for Google Cloud Monitoring
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_ackee_tech_b3d6584293/medium_ackee_tech_b3d6584293.png)
Workload Identity for GKE and Service account for Cloud Run
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_sql_windows_dbca623c75/medium_sql_windows_dbca623c75.png)
5 Use Cases for SQL Window Functions in a Real-Life Cat System
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_backend_stack_blog_cover_4c10b92603/medium_backend_stack_blog_cover_4c10b92603.png)
Backend Tech-stack Today and Before
![](https://storage.googleapis.com/ackee-blog-cms-static-files/medium_Blog_Universal_716bfbc2ab/medium_Blog_Universal_716bfbc2ab.png)