Author: Sergio Lema
-

What Does My CI/CD Pipelines Look Like?
In the following article, I show how to build an effective CI/CD pipeline in GitlabCI. I show how to separate some steps depending on the branches. Which steps are mandatory and best practices.
-

How I use Gitflow in real-life projects with GitlabCI
In the article of today, I’m gonna explain the usage of Gitflow in real-life projects. What adaptations I’ve made and how do I use it in my projects. I will also show how I’ve implemented Gitflow in my GitlabCI platform.
-

How to use React for a CRUD application
In this article, I show how to create the frontend of a CRUD application in React. I explain how to create the project and all the components necessary. The create, read, update and delete.
-

4 Ways to Protect Your Application From Being Hacked
In this article I describe 4 ways to secure an application to avoid 90% of the attacks. 4 simple ways to put in place in every kind of application. From using HTTPs to an external configuration system.
-

How to Solve a NullPointerException Correctly
In Java, one of the first exceptions everyone sees is the NullPointerException. Unfortunately, it took me some time to understand how to solve it correctly. In this article, I explain how to solve them correctly.
-

How Not To Create An Application
In this article I explain how not to create an application. I describe a real use case where I worked some years ago. Where we build a big application with a lot of complexity. But no clients and no profits.
-

7 Habits of Great Developers
In this article I talk about the 7 habits that differentiate a simple developer from great developers. The difference is not in the intelligence or the age but in the habits.
-

Advantages and Disadvantages of the JWT
A JSON Web Token (JWT) is widely used for stateless application authentication, but has limitations. It consists of three parts, including a signature for verification. However, it is susceptible to decryption, thus sensitive information like passwords should not be stored. Despite drawbacks, it offers a condensed JSON object and industry standard authentication. It’s important to…
-

Workflow of the Forget Password Strategy
In this article I explain the workflow of the password recovery strategy. I explain how to link the new password with the user, and how to generate a secure link that can only be used once.
-

3 Steps to Get a Job as a Junior With No Experience
Times are difficult to find a job. I’ve interviewed a lot of Junior developers. And here are the 3 main points that make me decide to hire the developer or not.
