Are you looking for a database that works as key/value pairs? High performance, obviously nosql and with disk persistence?
If the answer is “yes” but even if you’re not sure of what could be the solution, I’d really suggest to have a look at RedisDb, a good solution adopted for big performance challenges such log collections or page view ranking.
Continue reading “Data model in Redis”
Connect an OAuth Client to a server using Spring OAuth2 library is a lightweight way to get information from third part where this protocol is available.
In this post I’ll show you how to make it using few configurations and code files.
Continue reading “Spring boot Oauth2 – Client”
In this article I’m going to illustrate the implementation of Spring boot security Oauth2 from both the server and the client side. The example uses NoSQL Db as MongoDB, a choice that I think it’s optimal for this solution.
Continue reading “Spring boot Oauth2 with MongoDb e custom authentication”
Reactive programming model introduces a new prospective of programming. A good question is: Do I really need it? What’s wrong with model used today?
In this post, I’ll try to explain why this is an important switching and what this means for developers.
Continue reading “Spring Reactive – Key concepts and Latency”
Spring Cloud Stream improves the opportunities to distribute the task computation into different micro services using a message driven methodology.
Using a pattern based on source, process and sink, we’re able to build pipeline for resolving common issue as log processor. This is what I’m going to do in this article.
Continue reading “Log processor with Spring Cloud Stream”
I’ve learnt that modeling a schema for a NoSQL database (Mongo, Cassandra, …) is not the same thing of drawing a schema for SQL one (Oracle, MySql, …).
In this article, I’m going to illustrate what I’ve learnt reading by who knows more than me!
Continue reading “MongoDb Schema Design”
Have you ever thought of using your voice instead of plain text string to get authenticated?
It’s not science fiction, it’s called biometric authentication and, some company as Google, are going to moving on in the next years.
In this article, I’m going to illustrate it using an open source library and a little example.
Continue reading “Sample of Voice Authentication”