Training as a Tool of Delegation
Delegating without empowering is a recipe for disappointment. Show your team members how to do the task at hand and your job becomes easier
Delegating without empowering is a recipe for disappointment. Show your team members how to do the task at hand and your job becomes easier
Delegating without empowering is a recipe for disappointment. Show your team members how to do the task at hand and your job becomes easier
A practical guide on how to encrypt and decrypt data using the RSA algorithm in Java. We will also see how we can generate an RSA key pair and convert it to and from Base64
This article shows how to create a Spring Boot app that requires API key for an endpoint using Spring Security. We also demonstrate how to combine this with other authentication mechanisms in the same codebase.
In life, very few things trump “I’ve done it before”, this is how to get a 5 years worth of experience in 3 and maximise your employment
In this article, we will examine how to generate HMAC signature for a given data or message in Java with an example using the HMAC-SHA256 algorithm
In this tutorial, we are going to look at how to download bootstrap and jquery locally and use them to in our project even when we don’t have internet
Here is a curation of the different technologies that power the web and the ones you should learn to make a living as a web developer
In life, very few things trump “I’ve done it before”, this is how to get a 5 years worth of experience in 3 and maximise your employment
This is a tell-tale of my 1 year tenure at Cellulant. I solve challenges like too many meetings, knowledge democratisation, revamping of the SDLC, pull request reviews, onboarding process and more.
Life can be tough, great men do fall. Whatever comes our way, we must not quit for many - known and unknown - are dependent on our success
Being able to read log files on a production server can boost the quality of your emergency readiness and response. Read on to learn how.
This is a recap of how I moved from Laragon 2 to v3, my mistakes and how you can avoid them. Plus undocumented changes I discovered
Interacting with the Formstack API v2 just got better with this new fstackapi_php library. We’ll use it to submit form dynamically and more
Sometimes the coins make all the difference - between those who took-off and those who crash on the runway of entrepreneurship. The hustler’s poem
This article shows how to create a Spring Boot app that requires API key for an endpoint using Spring Security. We also demonstrate how to combine this with other authentication mechanisms in the same codebase.
This article shows how to create a Spring Boot app that requires API key for an endpoint using Spring Security. We also demonstrate how to combine this with other authentication mechanisms in the same codebase.
In life, very few things trump “I’ve done it before”, this is how to get a 5 years worth of experience in 3 and maximise your employment
In this article, we are going to consider the differences between @Transactional and TransactionTemplate in managing database transactions in a SpringBoot application. We will also observe their different behaviours with exceptions
We will learn how to use Flyway to create database schema and even seed the database with data when our application is starting up for the first time
In life, very few things trump “I’ve done it before”, this is how to get a 5 years worth of experience in 3 and maximise your employment
This article explains the MVC design pattern in a simple and easy to understand manner. We explored the Model, View and Controller component separately with a diagram to show the flow of a typical HTTP request in a MVC web application