Refactoring Software: philosophical takes (scientific laws) to methodological approach (lean 5S)
A look into the what and why of software refactoring
Providing quality software engineering content in the form of tutorials, applications, services, and commentary suited for developers.
A look into the what and why of software refactoring
Schemas and schema registries are the governance tools that ensure vitality of data communications through configurable compatibility guardrails as patterns and rules to evolve schemas in a controlled fashion. In this article I will demonstrate how Confluent Schema Registry can be used in conjunction with JSON Schema to govern and enforce rules for schema evolution in the default backwards compatibility mode.
In this article I demonstrate how to use the AWS Parameter Store to decouple and externalize configuration for a Spring Boot application.
In this article I review the concepts of Command Query Responsibility Segregation (CQRS) emphasizing the value and flexibility that this software architecture provides through indpendentent optimization of writing and reading data access patterns.
In this article I demonstrate how one can deploy a Spring Boot app the AWS Cloud with ECS and Fargate then used the Spring Boot Actuator project along with CloudWatch and AWS Lambda to modify runtime configuration in an event driven automated fashion.
In this article I present a walk through of the connonical Todos REST API which utilizes AWS DynamoDB to store todos and exposes Create, Read, Update, and Delete (CRUD) interfaces to manage todos implemented with MuleSoft's Anypoint Platform. DynamoDB is a fully managed No SQL document database provided by AWS with millisecond latency at any scale with proper data modeling. MuleSoft is the complete platform for integration and APIs.
This article presents an example of using AWS Cloud Development Kit (CDK) to deploy an AWS Cognito User Pool as an Identity Provider for authenticating a Spring Security enabled Spring Boot REST API.
In this article I demonstrate a Cloud Architecture pattern for distributing content stored in S3 but fronted by AWS CloudFront and accessed through signed URLs viable for a specified amount of time.
A collection of OAuth 2.0 and Open ID Connect (OIDC) terms and concepts I refer back to often.
In this article I capture a plethora of Kafka CLI commands that I've found useful. It is my goal to capture them here to serve as a cheatsheet of commands for myself and others to draw from.