In the past year, I’ve gone through a very tough interview for Amazon AWS. In this article, I’ve described my experience.

Photo by Bryan Angelo on Unsplash


This article is based on a REAL use case scenario for a database-intensive application, with a focus on performance. The experimental results I’ve come across can help you choose one or the other.

  1. Application and test description — what are we measuring and how
  2. Results and conclusion

APPLICATION AND TEST DESCRIPTION

  1. /find-all — Gets an increasing number of items from the DB
  2. /save — Persists a new item on the DB
  3. /get/{id} — Get an item from the DB
  4. /cpu/{load} —…


Give the context of a WEB application fault

Photo by David Clode on Unsplash

They found the hanging body on a sunny Monday afternoon. The screen was still displaying the last assigned task regarding a bug fix — misty, convoluted sentences without significance.

  1. What HAR these — a definition about HAR files and how them can help us fixing and reporting a bug;
  2. Generate a secure HAR file — using your…


After some experience in the field I have found several aspects that have made me turn up my nose — and I have found some maneuvers to straighten it back.

1 — KNOTTED REMOTE CALLS


Who does not want to power up his YAML files?

Photo by Biel Morro on Unsplash


Streams? Parallel Streams? Reactive Flux? Regular expressions? There are lots of different ways. Let’s see what is the best solution.

Photo by Jake Givens on Unsplash


Photo by Science in HD on Unsplash


The process is done in 4 simple steps.

Photo by Markus Winkler on Unsplash

1- Convert your QR code into the actual text

The first step of the decoding.
<dependency>
<groupId>com.google.zxing</groupId>
<artifactId>core</artifactId>
<version>3.3.0</version>
</dependency>
<dependency>
<groupId>com.google.zxing</groupId>
<artifactId>javase</artifactId>
<version>3.3.0</version>
</dependency>
HC1:6BdFOXN%TS3fDHPVO13J /G-/2YRVA.Q/R8NJE2FC1J9M$DIr9C3Ka9I0FULIRJPC%OQHIZC4.OI1RM8ZA.A53XHMKN4NN3F85QNCY0Or%0aVZ0r01HOC9JU0D0HT0rHB2PL/IBa09B9LW4T*8+DC9I0%YB+SG$*SBurgayE9*aFrJ7ID$0HY84Y*a9R1MR0J8-9+:I7/G90L.3T3*8%7TK3JE 4C-DM%2D-CY:aCYZ0PHN6D7LaLrK*2HG%89UV-0LZ 2ZJJ %C4IJZJJBYa43%8 C1VHLEC78aGr1TFrHM*K2ILS-O:Saf9UZ4+aFJE 4Y3LO78L:P…


A simple step-by-step guide to use Kubernetes ConfigMap to update the environment of a frontend application at runtime, without any additional libraries.

Photo by Joseph Barrientos on Unsplash

1 - Prerequisites: ConfigMap


Every one of us has at least one old semi-broken old phone in the drawer. In this article, I’ve described how I transformed this old piece of tech. junk into a fully functional security camera accessible from the internet.

My old Asus Zenphone with broken display. It has a very good camera :)
  • 1 Android phone with functioning WIFI connection, camera, and display
  • 1 Configurable Internet Router (or, to get things very spicy, you could install a private VPN server)

INSTALL THE APPLICATION:

Gaetano Piazzolla

Tech. leader and passionate developer.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store