Bihara JayawardhanaIntroduction of MicroservicesMicroservice is one of the hottest topics among most software developers. Microservice is an architectural style that structures an…Oct 19, 2022Oct 19, 2022
Bihara JayawardhanaRate LimitersA rate limiter is used to prevent the frequency of an operation from exceeding a defined limit. In large-scale systems, rate limiters are…Oct 17, 2022Oct 17, 2022
Bihara JayawardhanaDOS and DDOS attackWhat’s the difference between DoS and DDoS?Oct 12, 2022Oct 12, 2022
Bihara JayawardhanaManage Dependencies with BOMIn a real project environment, there is a possibility of crashing the project due to not using the right versions of project dependencies…Oct 4, 2022Oct 4, 2022
Bihara JayawardhanaREST API Naming ConventionsREST APIs are a powerful tool for communication and exchange of information between multiple applications or systems. Building and…Sep 7, 2022Sep 7, 2022
Bihara JayawardhanaData Stream TechniquesData streaming is a process of transmitting data continuously. Streaming data is become a core component of enterprise data due to the…Sep 6, 2022Sep 6, 2022
Bihara JayawardhanaJava ThreadsJava threads allow a program to run more efficiently by doing multiple things at the same time and threads can be used to operate…Sep 5, 2022Sep 5, 2022
Bihara JayawardhanaWhat is Proxy?A proxy act as a gateway between the client and the internet which means it is a server separating end users from the destination on the…Sep 5, 2022Sep 5, 2022
Bihara JayawardhanaSOAP Web ServicesNowadays there are huge numbers of applications which are designed using different programming languages. Exchanging data between…Sep 5, 2022Sep 5, 2022
Bihara JayawardhanaRest Service with KafkaKafka is one of the popular message brokers in the software engineering industry but that doesn’t mean Kafka is the best. Because those…Sep 5, 2022Sep 5, 2022