Security is one, if not the most important architecture characteristic. When we talk about security we usually talk in terms of authentication and authorization. Authentication refers to the ability of a user(or service) to access functionalities provided by other services. What are those functionalities are controlled by the authorization process. Two of the most used… Continue reading Open Policy Agent
Author: sergiuoltean
A change of seasons
Fundamental techniques of handling people Principle 1 - Don't criticize, condemn or complain Criticism is futile because it puts a person on the defensive and usually makes them strive to justify themselves. Criticism is dangerous, because it wounds a person's precious pride, hurts their sense of importance, and arouses resentment. There you are; human nature… Continue reading A change of seasons
Introduction to Architecture characteristics
Also known as *ilities(scalability, deployability), NFRs(non-functional requirements), quality attributes. There is no fixed list of these. We do however have a standard for these. It's ISO25010 and it looks like https://iso25000.com/images/figures/en/iso25010.png We extract these from business requirements(business characteristics), from the way we expect to operate the system(operational characteristics) and they are implicit, cross-cutting characteristics which… Continue reading Introduction to Architecture characteristics
Architectural Decisions
These are regularly taken by architects to solve a particular problem. There is a thin line between architectural decision and design decision. Should the architect also take a design decision? Ideally not, but as we know it all depends. Design decisions should be taken by the architect in collaboration with the tech leads and senior… Continue reading Architectural Decisions
Football Manager
You read it right. Today I'm gonna talk about my strategy that I used when I was playing this game. https://s2.dmcdn.net/v/AdDAh1LfLIUPbwg4i/x1080 I started with a mediocre team in 2nd tier. I was their manager. My goal was to promote it to 1st tier. I knew my chances are not that good, so the first thing… Continue reading Football Manager
We, the misfits
Have you ever feel that something is wrong with you? That you are swimming against the current. Well you might not be the only one. Some of us we like to say we write clean code, but are we clean coders? Do we apply the boy scout rule? At least we try. For us writing… Continue reading We, the misfits
Fitness functions
Once we build a product we must ensure its intrinsics stay healthy. In other words fit. We need to build some constraints that we must validate against every time we apply changes to our system. If those constraints fail validation the system should protect itself and not permit those changes. Every architecture should have a… Continue reading Fitness functions
Java 14 – The good, the bad and the ugly
Another non LTS version which was released on 17th of march 2020. Let's go through some of the features. https://assets.sewickleyherald.com/2019/11/The-Good-The-Bad-The-Ugly-Slider-cropped.jpg The Good You see, in this world there's two kinds of people, my friend: Those with loaded guns and those who dig. You dig. Records Well this was a long awaited feature. It's still a… Continue reading Java 14 – The good, the bad and the ugly
Domain Driven Design Compromises
Domain driven design is a great way to build applications. You can isolate the business from the infrastructure and speak with non-technical team members using the ubiquitous language. The domain should be clean from infrastructure, but as we will see in the next lines some compromises need to be made. Lombok. Do we use lombok… Continue reading Domain Driven Design Compromises
Data transfer object
Data transfer object(DTO) or transfer object as you find it under the CoreJ2EE patterns it's used to bundle data from multiple places into one object which we send to a consumer. Usually we find this at the business and data layers of our applications. Its purpose is to decouple these layers from the presentation. For… Continue reading Data transfer object