
How To Better Store Password In Database
ℹ️New Article: How a Database Index Works and How to Use It Effectively How Would You Store Your User&
ℹ️New Article: How a Database Index Works and How to Use It Effectively How Would You Store Your User&
JSON Web Token or JWT has been famous as a way to communicate securely between services. There are two form of JWT, JWS and JWE. This article will explore the implementation of the JWT in Java Spring Boot.
The security and privacy of users' data have been a growing concern for the past few years. At the same time, JWT, as one technology to combat it, has been used more and more.
For the past years, Docker has been disrupting the Developers and DevOps field. Many people think Docker is a programming
Recently, Ghost has just launched its major up. I will write how I updated my website to Ghost v4, my first impression and speed testing.
Both Java and Elasticsearch is a popular technology stack companies use. Java is a programming language that was released back
This article contains many referral link. Using referral link will help me to keep updating this blog Be sure to
If you know me, you might’ve noticed I created a new blog with Ghost. My old WordPress blog is
One component we can tune so Elasticsearch can return relevant documents is Analyzer. Analyzer is a component responsible for processing
Typo is something that often happens and can reduce user’s experience, fortunately, Elasticsearch can handle it easily with Fuzzy Query. Handling typos is a must if you’re building an advanced autocomplete system with the Elasticsearch.
Being a software engineer is hard — There are many aspects you need to improve. Most of the times, people just
In 1964, British computer scientist Tony Hoare invented the Null Pointer References. The Null Pointer Exception has contributed the most