Author: Sergio Lema
-

7 Habits of Great Developers
In this article I talk about the 7 habits that differentiate a simple developer from great developers. The difference is not in the intelligence or the age but in the habits.
-

Advantages and Disadvantages of the JWT
A JSON Web Token (JWT) is widely used for stateless application authentication, but has limitations. It consists of three parts, including a signature for verification. However, it is susceptible to decryption, thus sensitive information like passwords should not be stored. Despite drawbacks, it offers a condensed JSON object and industry standard authentication. It’s important to…
-

Workflow of the Forget Password Strategy
In this article I explain the workflow of the password recovery strategy. I explain how to link the new password with the user, and how to generate a secure link that can only be used once.
-

3 Steps to Get a Job as a Junior With No Experience
Times are difficult to find a job. I’ve interviewed a lot of Junior developers. And here are the 3 main points that make me decide to hire the developer or not.
-

Complexity vs Urgency
In this article I explain how to identify and prioritize the tasks depending on their complexity and urgency. I explain the not complex and not urgent tasks, the complex but not urgent tasks, the not complex but urgent tasks and the complex and urgent tasks.
-

4 Performance Optimization Techniques for Your Application
In this article, I show 4 performance techniques to optimize the response time of an endpoint. 4 steps which goes from the most simple to the most complex as: memoization, pagination, denormalization and cache.
-

Deploy a React Frontend to AWS S3
In this article I will go step by step to deploy a React frontend application to AWS S3. From creating the S3 Bucket to deploy the React project.
-

Upload your Angular Frontend to GCP Storage
In this article, I’m gonna show how to quickly create a GCP Storage Bucket to deploy an Angular application.
-

Solve the CORS error with Spring Security
In this article I explain how to configure the CORS allowed frontend in a Spring Boot application when using Spring Security.
-

How I Solved 20 Vulnerabilities in Less Than An Hour
In this article I describe the steps I’ve followed to solve more than 20 vulnerabilities of a project in less than an hour. I show all the steps to follow from finding the problem to deploying the solution to the production environment.
