Anwar HidayatGondar — the Bounty Hunter (2/2)In the previous post, I shared about Gondar at a high level with its business requirements. Now, I would like to share Gondar in terms of…Sep 16, 2021Sep 16, 2021
Anwar HidayatGondar — the Bounty Hunter (1/2)In the previous posts, we shared how we consider data governance as one of many important keys we have to apply in Gojek. Now, we want to…Sep 16, 2021Sep 16, 2021
Anwar HidayatinAnalytics VidhyaCalling Function from InputWhy is calling function from input a security concern?Apr 6, 2020Apr 6, 2020
Anwar Hidayatrm -rfAfter talking about TDD Principle, now I’m gonna talk about `rm -rf` principle and its implementation.May 23, 2019May 23, 2019
Anwar HidayatTDD PrincipleHi, Anwar here. In this opportunity, I would like to tell a story about TDD.Apr 7, 2019Apr 7, 2019
Anwar HidayatEnvironment for DevelopmentHi, Anwar here. In this opportunity, I would like to share about the environment we can use during developing software.Apr 3, 2019Apr 3, 2019
Anwar HidayatBe Cautious in InternetHi, Anwar here. In this story, I would like to share why we need to be cautious in using the internet.Mar 29, 2019Mar 29, 2019
Anwar HidayatWater to Help FocusHi, Anwar here. In this story, I would like to share something non-technical.Mar 28, 2019Mar 28, 2019
Anwar HidayatMake Strong PasswordHi, Anwar here. In this opportunity, I would like to share something about a password. Yes, password.Mar 27, 2019Mar 27, 2019
Anwar HidayatAlgorithm is ImportantHi, Anwar here. In this post, I would like to tell you about the importance of algorithms in developing software.Mar 26, 2019Mar 26, 2019