Published inLevel Up CodingTricky Parts in Java GenericsThings you need to know to master Java GenericsMay 9A response icon1May 9A response icon1
Published inLevel Up CodingSpring Security: Part-2 — AuthorizationFine-grained access controlMar 7Mar 7
Published inLevel Up CodingSpring Security: Part-1 — AuthenticationThe magic of the combination of spring-boot-starter-web and spring-boot-starter-securityFeb 10Feb 10
Published inLevel Up CodingIntroduction to Java ReflectionWith great power comes great responsibilityJan 27Jan 27
SOLID Principles — 5: Dependency Inversion PrincipleThe formal definition of the dependency inversion principle is simply this: high-level policy should not depend on low-level details…Dec 16, 2024Dec 16, 2024
Published inLevel Up CodingSOLID Principles — 3: Liskov Substitution PrincipleLet’s continue learning SOLID principles with the third principle, the Liskov Substitution Principle, introduced by Barbara Liskov.Dec 15, 2024Dec 15, 2024
Published inLevel Up CodingSOLID Principles — 4: Interface Segregation PrincipleIn this article, let's understand the Interface Segregation Principle. The interface segregation principle says that Clients should not be…Dec 15, 2024Dec 15, 2024
Published inLevel Up CodingSOLID Principles — 2: Open-Closed PrincipleThe first part of this article series provided an overview of SOLID and the single-responsible principle. Now, it is time to examine the…Oct 24, 2024Oct 24, 2024
Published inLevel Up CodingSOLID Principles — 1: Introduction and Single Responsibility PrincipleSOLID is an acronym formed by combining the first character of five principles that help to manage source code dependenciesAug 18, 2024Aug 18, 2024
Published inLevel Up CodingUnderstand the Role of SLF4J in Java LoggingLogging is essential in any application. In the Java ecosystem, it is hard to find a clean solution due to the availability of different…Jul 9, 2024Jul 9, 2024