A Java Geek weekly 29

On house building and software development projects

Debunking the house building and software development comparison.

9 Advanced Python Type Hints That Will Improve Your Code Significantly

TL;DR:

  • TypeVar — Python 3.5
  • NewType — Python 3.5
  • Final — Python 3.8
  • TypedDict — Python 3.8
  • Protocol — Python 3.8
  • Union — Python 3.5
  • Callable — Python 3.5
  • Annotated — Python 3.9
  • TypeAlias — Python 3.10
Introducing an OpenTelemetry Collector distribution with built-in Prometheus pipelines: Grafana Alloy

Something I definitely needs to play with.

Alternatives to Auth0 we are most excited about in 2024

TL;DR:

/Building Something Real in your spare time

TL;DR:

  • Set goals
  • Divide into milestones
  • Make yourself accountable
  • Something every day
  • Don’t force it
  • Iterate, iterate, iterate
  • Sustainable pace
  • Timebox everything
  • Ruthlessly trim scope
  • Let life intrude

    Works great for writing a book too!

OpenTelemetry Baggage

Contextual information that is passed between signals

APT44: Unearthing Sandworm

With Russia’s war in Ukraine in its third year, Sandworm remains a formidable threat to Ukraine. The group’s operations in support of Moscow’s war aims have proven tactically and operationally adaptable, and as of today, appear to be better integrated with the activities of Russia’s conventional forces than in any other previous phase of the conflict. To date, no other Russian government-backed cyber group has played a more central role in shaping and supporting Russia’s military campaign.

Yet the threat posed by Sandworm is far from limited to Ukraine. Mandiant continues to see operations from the group that are global in scope in key political, military, and economic hotspots for Russia. Looking forward, a record number of people will participate in national elections in 2024, and Sandworm’s history of attempting to interfere in democratic processes further elevates the threat the group may pose in the near-term. Given the active and persistent threat to governments and critical infrastructure operators globally, Mandiant has decided to graduate the group into APT44.

Announcing py2wasm: A Python to Wasm compiler

py2wasm converts your Python programs to WebAssembly, running them at 3x faster speeds

How to rebase against another branch overriding conflicts with your own branch changes

I’m always updating my demos with the latest dependencies. Sometimes, I work on a branch but the package-lock.json, yarn.lock, etc. is out-of-date and I want to keep the latest from master:

git rebase -Xtheirs --onto master HEAD^
Coroutines and effects

Quite theoretical post; I had to read a couple of questions several times to get the gist of them.

The dangers of "decentralized" ID systems

Some interesting points but the idea that privacy is a benefit above all others is IMHO exactly the same argument to bear arms. There definitely are privacy issues at work nowadays. On the other side of the spectrum, I daily notice abusive behavior, or even death threats, and no legal accountability because of anonymity.

It’s a debate to have but the author’s brush is definitely much too large to understand the consequences of his extreme stance.

Design patterns for #extracting from REST APIs

A couple of ideas to cope with flawed APIs.

Nicolas Fränkel

Nicolas Fränkel

Developer Advocate with 15+ years experience consulting for many different customers, in a wide range of contexts (such as telecoms, banking, insurances, large retail and public sector). Usually working on Java/Java EE and Spring technologies, but with focused interests like Rich Internet Applications, Testing, CI/CD and DevOps. Also double as a trainer and triples as a book author.

Read More
A Java Geek weekly 29
Share this