Published inJavarevisitedCryptography Primer : Hashing vs Encoding vs EncryptionRecently, while working on a project, I had the requirement to create a hash for the JSON string for the idempotency requirement. This…Dec 6, 2023Dec 6, 2023
Published inLevel Up CodingThe Granularity Conundrum: Finding The Right Size of a MicroserviceDetermining the right level of granularity — the size of the service — is one of the many hard parts of software architecture that we ….Jun 11, 20231Jun 11, 20231
Published inJavarevisitedValue Objects: Design heuristics for modelling value objectsPrologueAug 16, 2022Aug 16, 2022
Published inLevel Up CodingKafka Primer for Docker: How to setup Kafka, start messaging and monitor broker metrics in DockerThe post focus on how to set up Kafka in the docker environment, the common mistakes we do while connecting to Kafka from the Docker host…Jul 11, 20222Jul 11, 20222
Published inGeek CultureTenets of Good ProgrammingTen evergreen software development principles every developer should know in 2021Sep 28, 20211Sep 28, 20211
Published inLevel Up CodingModelling Saga as a State MachineAn orchestrator driven approach for managing distributed and long running transactionsJul 20, 20212Jul 20, 20212
Why you should use protocol buffers for data serializationa fast and secure data serialization through protobufsJun 6, 2021Jun 6, 2021
A quick and practical guide on how to setup and start running Kafkaa practical play guide on Kafka for beginnersJun 6, 2021Jun 6, 2021