Keycloak is a wonderful piece of software, managed with success by RedHat, to be used as an Identity and Access […]
Author: admin
What Ted Lasso Can Teach Us About Imposter Syndrome
Imposter Syndrome: In any line of work, it’s a viper in the grass that creeps its way into the mind […]
JavaScript Execution Context
It is important to view knowledge as sort of a semantic tree — make sure you understand the fundamental principles, […]
[PT-BR] Reflection com JPMS
Desde que surgiu o JPMS (Java Platform Module System), alguns comportamentos da plataforma sofreram alterações. Podemos citar como exemplo o […]
How to develop an online code compiler using Java and Docker
In this tutorial, we are going to see an overview of how to create a simple and efficient online code […]
Java 8 Stream API on Arrays
Java 8 introduced the concept of functional programming. My first instinct when I need to iterate is to use a […]
Taking a Look at REST API Design Patterns
We know what webservices are, and that there exist multiple types of webservices. But the main type is REST—although it […]
Bootstrap 5 Chips
What are Bootstrap Chips? Chips (aka tags) make it easier to categorize content and browse ie. through different articles from […]