About:

The website is authored by someone who identifies as a software developer, as indicated by the site name 'Just Another Software Developer'. However, there is no additional specific information about the author provided in the metadata.

Website:

Specializations:

Outgoing Links:

Dr. Werner Vogels
Subscribe to RSS:
The author shares their career journey from startups to Amazon and back to startups, advising new graduates against starting their careers at FAANG companies. They highlight the steep learning curve, poor documentation, and promot...
The post provides a step-by-step guide on how to transfer eBooks from a Kindle Paperwhite to a Kobo Libra Colour using Windows 10. It details the necessary software installations, including Kindle for PC 1.17, NoDRM, and Calibre, ...
The text provides tips and tricks for passing the driving test in BC, Canada, including specific instructions for the test day and during the test itself.
The text is a list of recipes for various dishes, including tarta de espinaca, tortilla de papa española, empanadas, milanesas, pollo al horno, pollo con arroz, omelette de jamon y queso, caprese orzo bake, albondigas, basa fillet...
The text provides an overview of Kubernetes, including abstractions, services, namespaces, and objects in the Kubernetes API. It also covers Minikube, Kubernetes proxy, DNS server, context, and configuration. Additionally, it disc...
The text discusses various LeetCode patterns in Go, including two pointers, sliding window, prefix sum, running sum of arrays, hashing, fast & slow pointers, dummy node, stack, queue, deque, monotonic queue or stack, DFS, BFS, Dij...
The text discusses how to handle program interruptions gracefully in Go, providing a code example and a demo. It explains how to use the signal package to create a context that listens for interrupt and kill signals, and how to ha...
The text discusses different ways to handle errors in Go, including errors.New(), fmt.Errorf(), sentinel errors, and custom error types. It explains the use cases and limitations of each method.
The text discusses identity management in modern applications, covering topics such as provisioning authorization, authentication, access policy enforcement, single sign-on, stronger authentication, logout, account management, dep...
The text discusses the concept of a 'boomerang employee' and the author's experience with a recruiter from AWS. The author expresses frustration at being asked to go through a coding interview despite having previously worked for ...
The text discusses the replication architecture of AWS DynamoDB, highlighting the differences between single-region and multi-active database setups. It explains the handling of concurrent writes and the limitations of locking str...
The Web Application Hacker’s Handbook is a 900+ page book that discusses vulnerabilities in web apps, core defense mechanisms, web application technologies, mapping the application, bypassing client-side controls, attacking authen...
...