PinnedAuthentication and Authorization with Spring SecurityI will explain various authentication and authorization mechanisms, highlighting their pros and cons. Additionally, I’ll explore JWT and…Dec 19, 2023A response icon9Dec 19, 2023A response icon9
Published inLevel Up CodingMastering Kafka with Avro SchemasWhen working with distributed systems like Apache Kafka or other data pipelines, ensuring smooth communication between producers and…Jan 29Jan 29
Published inLevel Up CodingMastering Kafka: Key Concepts and How It Works (Part 1)Imagine building a system where data flows seamlessly between different services in real-time, such as tracking orders in an online store…Dec 20, 2024A response icon2Dec 20, 2024A response icon2
Published inLevel Up CodingHow to Run and Use Open Source Models on Your ComputerSpring AI — Run Meta’s Llama 3.1 Locally with Ollama 🦙 | Hands-on GuideAug 26, 2024Aug 26, 2024
Essential Startup Terms and PhrasesThinking about starting a business or just curious about startups? This blog will explain what a startup is, the different types of…Aug 7, 2024Aug 7, 2024
Published inLevel Up CodingSpring AI: Communicating with LLMs and Parsing ResponsesA Comprehensive Guide with Java 21, Spring AI, and OpenAIMay 18, 2024May 18, 2024
Published inAWS TipExploring AWS Lambda and SnapStartA detailed example with Java 21 and Spring CloudJan 26, 2024Jan 26, 2024
How to Structure CodeSoftware design best practices, discovering package by layer, package by feature, and hexagonal architecture/ports and adapters.Dec 2, 2023A response icon3Dec 2, 2023A response icon3