JWT Token Authentication in Angular 14 and .NET Core 6 Web API

Read all

Six Considerations When Building High-Performance Java Microservices With EDA

Read all

System Architecture: Move Authentication to the API Gateway

When exposing an application to the outside world, consider a Reverse-Proxy or an API Gateway to protect it from attacks. Rate Limiting comes to mind first, but it shouldn’t stop there. Read all

Comparing Message Queues and Message Brokers: Understanding the Differences

In this article, you will better understand what message brokers and message queues are, alongside their differences. Read all

A Complete Guide to Turning Text Into Audio With Audio-LDM

Unleashing the power of AI for text-to-audio generation with the Audio-LDM model. Read all

(Hopefully) The Final Article About Equals and HashCode for JPA Entities With DB-Generated IDs

There is a 99% chance that your JPA entities have incorrect equals/hashСode! Find out what the best implementations of these methods should look like. Read all

How To Secure RESTful Web Services

Learn how to ensure the safety of your RESTful API with these efficient methods in this insightful article. Read all

Twelve Pitfalls To Avoid in Data Integration

Read all

Evaluating Apache APISIX vs. Spring Cloud Gateway

Spring Cloud Gateway and Apache APISIX are two (API) Gateways offering more or less the same set of features. Learn how their approach is radically different. Read all

APIs Under Attack: How To Prepare for and Respond to Breaches

Read all

 

 

 

 

Top