When we start studying Java after learning that all objects extends from the Object class, it common to be introduced to the equals() and hashcode()…
Tech is fun!
When we start studying Java after learning that all objects extends from the Object class, it common to be introduced to the equals() and hashcode()…
Distributed systems are complex and challenging, and there are many fallacies that can arise when building and operating them. Here are eight of the most…
As announced by Docker. starting on February 1st, 2022, Docker Desktop for Windows will require a paid license under these conditions: A company with at…
On the previous parts, Part 1 and Part 2, it was given an introduction on OAuth and Keycloak configuration. Now I will show how to…
In the part 1 of this article, I gave an overview of OAuth 2 framework. In this part I will introduce Keycloak and start getting…
Securing an application is a very sensitive topic. It brings complexity, but it can’t be negleted. On this article I give a brief introduction about…
When I started learning about Spring Boot, I usually saw examples using application.properties/application.yml and bootstrap.properties/bootstrap.yml. Then this was confusing my head. Let’s see the case…
One of the topics that I’m most interested in, is Microservices and building scalable applications. So, during my journey of improving my knowledge in this…
This is the first post and I would like to explain a bit about my intentions of writing this blog. First, one problem that usually…