Hello again! In this article (Part 1), we will discuss two common ways to build modern software systems: Event-Driven Architecture (EDA) and Change Data Capture (CDC). They serve different purposes
Introduction Building secure applications is a top priority for any developer, and when it comes to APIs, security becomes even more crucial. APIs expose sensitive data and functionality, making them
This cheat sheet covers the most frequently used kubectl commands that every developer working with Kubernetes should know. 1. Cluster Information Displays the version information of
Introduction In the world of software development, SQL optimization is a critical skill that every Java engineer must master. Efficient database interactions can significantly enhance the performance of your applications,
Kubernetes for Java Engineers Made Easy As Java developers, we're accustomed to building robust applications that can run on any platform. However, deploying and managing these applications in a scalable,
-
Hello again! In this article (Part 1), we will discuss two common ways to build modern software systems: Event-Driven Architecture (EDA) and Change Data Capture
-
Introduction Building secure applications is a top priority for any developer, and when it comes to APIs, security becomes even more crucial. APIs expose sensitive
-
This cheat sheet covers the most frequently used kubectl commands that every developer working with Kubernetes should know. 1. Cluster Information
Event-Driven Architecture and Change Data Capture Made Easy
Hello again! In this article (Part 1), we will discuss two common ways to build modern software systems: Event-Driven Architecture (EDA) and Change Data Capture (CDC). They serve different purposes but can work well together in some situations. we’ll explain EDA and CDC, discuss their use cases, and explain when
Don’t Get Hacked! Securing Java APIs with the OWASP Top 10
Introduction Building secure applications is a top priority for any developer, and when it comes to APIs, security becomes even more crucial. APIs expose sensitive data and functionality, making them attractive targets for attackers. The OWASP API Security Top 10 provides a list of the most critical security risks to
Kubernetes Developer Cheat Sheet
This cheat sheet covers the most frequently used kubectl commands that every developer working with Kubernetes should know. 1. Cluster Information Displays the version information of the client and server. Displays cluster information, including the master node address and Kubernetes version. Lists all nodes in the cluster and
SQL Best Practices Every Java Engineer Must Know
Introduction In the world of software development, SQL optimization is a critical skill that every Java engineer must master. Efficient database interactions can significantly enhance the performance of your applications, leading to faster response times and a better user experience. This comprehensive guide dives into the best practices for SQL
Kubernetes for Java Engineers Made Easy: Part-1
Kubernetes for Java Engineers Made Easy As Java developers, we’re accustomed to building robust applications that can run on any platform. However, deploying and managing these applications in a scalable, resilient manner can be challenging. Enter Kubernetes—a powerful platform designed to automate the deployment, scaling, and operation of containerized applications.
Resilience in Microservices: Implementing the Retry Pattern in Java
Introduction Welcome back! Building on our previous discussion on the Circuit Breaker pattern, this article will explore one of the essential resilience patterns. Implementing resilience in microservice with the Retry pattern in Java is crucial for enhancing reliability and delivering a seamless user experience. by providing mechanisms to handle transient