When we write a Java program and issue a javac command , the program is compiled to bytecode.To execute this program, we issue a java command and when we do so, the bytecode generated by javac is interpreted by the Java Virtual Machine (JVM) to produce machine code which is ultimately fed to CPU to … Continue reading Execution of a Java Program & Role of Just In Time (JIT) Complier
JWT (JSON Web Token) is a very popular way to do user authorization in microservices. It is a standard which is used to create access tokens for an application and enables secure communication between between two parties.The Industry standard specification RFC7519 outlines how information in JWT should be structured.It is widely used in microservices based … Continue reading What is JWT and why do we need it in a microservices based application?
Dependency injection is a technique used in software engineering to develop loosely coupled systems.It is a technique that allows an object to receive other objects that it depends on by some other program than it explicitly calling the dependent object.Let us understand why this is needed by an example. I have a Notification Interface which … Continue reading What is Dependency Injection & why do we need it ?
Just found the built in Task Manager for Google Chrome that allows you to see how much memory and CPU web pages, extensions, and Google processes are consuming while Chrome is running. A very useful feature to find out which web page or chrome extension is consuming more memory, CPU and slowing down your system. … Continue reading Chrome Task Manager
Podman (POD MANager) is a container engine, developed by Red Hat which is designed to be a replacement for Docker. It is now the default container engine used by Red Hat Enterprise Linux (RHEL).Podman was also a lot in the news as an alternate for Docker when Docker announced change in its subscription plan. If … Continue reading Podman, a secure alternative for Docker.