devops Running Cypress end-to-end tests in parallel using AWS Codepipeline CI Where and how to start the DevOps transformation journey Use Telemetry to amplify feedback and see problems as they occur Deliver faster by applying the DevOps Flow techniques The Principles of DevOps Boost your Cypress end-to-end Tests Continuous Integration with Github Actions and Cypress Validating user email domains with AWS Cognito Securely centralized configuration with Spring Cloud Config
devops-journey Where and how to start the DevOps transformation journey Use Telemetry to amplify feedback and see problems as they occur Deliver faster by applying the DevOps Flow techniques The Principles of DevOps
java Refactoring a RPG Game Bringing back OSGi Creating page visit statistics using Redis Port Scanner Chatbot - Parte 2: Criando a API e configurando o Slack App Port Scanner Chatbot - Parte 1: Construindo um Port Scanner com Java Autenticação com JWT no Spring Boot Lidando com CORS no Spring
javascript Hosting private NPM packages for free Boost your Cypress end-to-end Tests Securing Vuejs applications with Access Control List Theros: CLI para deploy de sites estáticos OAuth Github web flow doesn't support CORS Sharing data across Vuejs components Novos Filters do Vue.js 2
microservices Securely centralized configuration with Spring Cloud Config Sistemas de mensageria Dicas para rastrear falhas em microserviços
offtopic The joy of learning new stuff has been stolen Livros, blog posts e documentários que me influenciaram The internet master switch The shame of being a non-passionate developer Restrição de conteúdo e o futuro da internet Nem tudo precisa ser escalável Avaliando desenvolvedores: a falácia das métricas Qualidade de código e o developer Chaplin Desventuras em processos de contratação Vamos ensinar beleza aos programadores
operating-systems Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads IX: A Protected Dataplane Operating System for High Throughput and Low Latency Dune: Safe User-level Access to Privileged CPU Features The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors The Google File System Crash Consistency: FSCK and Journaling The Design and Implementation of a Log-Structured File System RadixVM: Scalable address spaces for multithreaded applications Practical, transparent operating system support for superpages Non-scalable locks are dangerous Eraser: A Dynamic Data Race Detector for Multithreaded Programs Serverless Computation with OpenLambda The Singularity system Xen and the Art of Virtualization Exokernel: An Operating System Architecture for Application-level Resource Management The Evolution of the Unix Time-sharing System The UNIX Time-Sharing System
paper-summary Shenango: Achieving High CPU Efficiency for Latency-sensitive Datacenter Workloads IX: A Protected Dataplane Operating System for High Throughput and Low Latency Dune: Safe User-level Access to Privileged CPU Features The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors The Google File System Crash Consistency: FSCK and Journaling The Design and Implementation of a Log-Structured File System RadixVM: Scalable address spaces for multithreaded applications Practical, transparent operating system support for superpages Non-scalable locks are dangerous Eraser: A Dynamic Data Race Detector for Multithreaded Programs Serverless Computation with OpenLambda The Singularity system Xen and the Art of Virtualization Exokernel: An Operating System Architecture for Application-level Resource Management The Evolution of the Unix Time-sharing System The UNIX Time-Sharing System
port scanner Port Scanner Chatbot - Parte 2: Criando a API e configurando o Slack App Port Scanner Chatbot - Parte 1: Construindo um Port Scanner com Java
security Validating user email domains with AWS Cognito Securing Vuejs applications with Access Control List Securely centralized configuration with Spring Cloud Config O que é Memory Safety Entendendo e explorando Buffer Overflow A usabilidade e segurança das senhas Como funciona o protocolo OAuth 2.0 Autenticação com JWT no Spring Boot SSL gratuito com Cloudflare
spring Securely centralized configuration with Spring Cloud Config Autenticação com JWT no Spring Boot Lidando com CORS no Spring
vuejs Securing Vuejs applications with Access Control List Sharing data across Vuejs components Novos Filters do Vue.js 2