Recent Articles

Dependency Injection and Inversion of Control

Inversion of control (IoC) is simply providing a callback (reaction) to an event that might happen in a system. In other words, instead of executing some logic directly, we invert the control to that callback whenever a specific event occurs.

Read more

6 Proven Cloud Cost Management Practices for Kubernetes

Teams looking to control and reduce their cloud costs can choose from multiple cloud cost management approaches. All of them require at least a basic understanding of what’s going on in your cloud infrastructure - this part relies on monitoring and reporting.

Read more

Building a Url Shortener With Node.Js

How to design a URL shortening service like tinyurl.com is a frequently asked question in system design interviews. URL shortener services convert long URLs into significantly shorter URL links.

Read more

Automated Tests with Feature Flags and Cypress

Development teams, nowadays, can deliver quick value to consumers with far less risk with the help of feature flag-driven development.

Read more

Configuring CSRF/XSRF with Spring Security

Cross-site Request Forgery (CSRF, sometimes also called XSRF) is an attack that can trick an end-user using a web application to unknowingly execute actions that can compromise security.

Read more

Feature Flags Best Practices

Feature flags, in their simplest form, are just if conditions in your code that check if a certain feature is enabled or not.

Read more