Cross-cutting concerns are an integral part of any system design. By identifying and defining the Cross-cutting concerns upfront helps to design more secure and performant applications
AWS Elastic Container Registry can now be setup to automatically scan images on push and provide feedback on vulnerabilities that need to be addressed.
Creating and setting up a JWT server requires some tedious and repetetive steps. In this article we look at how you can use Magic to create it in 1 second
Porter, a load balancer developed for bare metal Kubernetes cluster, was officially included in CNCF Landscape—marking it as an important solution for developers.
Cache invalidation has a lot of tricks and can be confusing. We'll often use ''req.url ~ /'' even though there's a better way. Here's why we use it, why it's good but mostly bad, and how to fix it.
These are best online courses to learn Spring Boot, Advanced Java, Docker, React, Microservices, DEvops, and Angular to become full stack Java developer.