Database Encryption Pt2 - Connection Encryption
Welcome back to the second instalment of our journey into the realm of database encryption with PostgreSQL and Spring Boot. In this continuation of our multi...
Welcome back to the second instalment of our journey into the realm of database encryption with PostgreSQL and Spring Boot. In this continuation of our multi...
In today’s digital landscape, safeguarding sensitive data is paramount. As cyber threats continue to evolve, organizations must adopt robust measures to prot...
The Old Ladies is a tic-tac-toe game developed using MonoGame. It is a classic game where two players take turns marking X and O on a 3x3 grid. The objective...
It’s common for developers to spend most of their day between meetings, team syncing, or being interrupted by other team members without any intention to und...
I recently started thinking about the role of techlead, after all today I occupy this role and I would like to share here some of my reflections on what it m...
Top of the morning for you This is a new beginning for this blog. It will serve as a starting point on this new journey in our lives, and I say wow because ...
In my time writing some APIs and micro services, I’ve faced some problems with multi database environments. On the company I’ve worked at that time, we have ...
Some time ago, I was debating with some friends about writing an article for the comunity,but I never thought on what is be interesting, so I decided to writ...