Using Dates Correctly in Applications

Introduction This is one of the topics that is not very common. Even though we are always interacting with Dates and Times in our application, they can be very complex depending on your use case. Our entire application broke because…

Problems with Enumerations to avoid

Introduction Most of today’s programming languages support Enums. These types have the power to be very descriptive while being a value type: An enum is a named constant that corresponds to an integer value type. Each member maps to a…

How does Kubernetes work?

Kubernetes is an open-source container management system used in large-scale enterprises in several dynamic industries to perform a mission-critical task or an orchestration task. Some of its capabilities include the following: It manages the containers inside the cluster. It deploys applications…

OWASP Top 10 Vulnerabilities And Remediation

Introduction Cloud native applications, with their distributed architectures that comprise many third-party libraries and services, are an attractive target for hackers. The fact that 82% of all vulnerabilities are found in application code is not lost on attackers, who seek…

Microservices Distributed Transactions

In this article, we are going to discuss Microservices Distributed Transaction Management when performing CRUD operations. As you know that we learned practices and patterns about Microservices Data Design patterns and add them into our design toolbox. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article,…

Choose a Database for Microservices — CAP Theorem

In this article, we are going to discuss How to choose database for Microservices in order to understand data considerations for microservices with learning practices and patterns about Microservices Data Design patterns. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to choose…