The Basic Laws of Human Stupidity is a short essay written by the Italian economist Carlo Cipolla. The first edition was written in English and released in 1976. Originally, it was intentionally distributed only among his friends on a confidential basis. The reason is simple. That book was intended as a sort of joke, where he faced a few serious topics in a lighthearted and not-to-be-taken-too-seriously way.
The most famous excerpt is the one on human stupidity. When addressing such a sensible theme, he came up with an extravagant and interesting theory, which earned him incredible success. Not only was…
RAM is one of the most expensive resources offered by cloud providers. So, storing all your cached data in in-memory caches comes with a price. This is why it is essential to implement techniques aimed at not wasting it.
Plus, this becomes practically unavoidable when your Spring Boot application and cache server coexist in the same machine, sharing the underlying resources. In fact, the less RAM the cache steals from the application, the better. Also, serialized Java objects are known to take up a lot of space. So, by caching them, your RAM may run out of space very easily.
May 2021 marked a turning point in my writing career. Not only did I celebrate my first 100k views, but I was also recognized as a top 2,000 writer in the Partner Program.
Receiving the following email was quite a shock and, being completely honest, I would never have expected it.
Over the past few days, GomorraSQL’s been making waves and trending in the Italian IT community. I’ve read thousands of posts on Twitter and LinkedIn mentioning this project, so I couldn’t resist looking into it. Created by Donato Rimenti, GomorraSQL is inspired by the Italian television series Gomorrah and allows you to query a database in Neapolitan.
Although these kinds of projects shouldn’t be taken too seriously, they do play a crucial role in the IT community. Let’s find out why.
At the beginning of 2020, I started my business as a freelance software engineer. Since then, I have been collaborating with many startups, trying to help them develop their products and grow as companies. Before launching my own company, I had planned to study other successful businesses.
Out of all the startups I have been working with, Kama.Sport was the one that impressed me the most. Kama.Sport is an Italian startup trying to redefine the rules in the sports industry by developing highly-tailored software products based on data analysis, integration, and exploration. …
I studied software engineering and during my college years, almost every student could boast a brand-new laptop. Back in those years, I had a 7-year-old low-performing laptop. Instead of replacing it, as anyone else would have done, I decided to stick with it.
Although my friends thought I had some sort of attachment to that computer, it was not the case. On the contrary, my decision was completely intentional. In fact, I was aware what this would play a key factor in helping me grow as a developer since the beginning of my journey.
Let’s see why working with a…
As one of the top 20 students in Italy, during my academic journey, I was fortunate enough to meet other top students. Not only did I have the opportunity to talk to them, but also to become friends with a few of them. Although we shared many common accomplishments, the more I met top students, the more I became convinced we had different approaches to our studies.
This helped me identify three types of top students. Let’s see them all.
In my experience, over 90% of top students fit here. Just like soldiers, the majority of top students I met…
As the great Medium Enhanced Stats Chrome extension reminded me, last month I celebrated my first 100k views on Medium. When I started writing technical articles six months ago, I would have never expected to achieve such a milestone.
“Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is found in how easily it can be extended to meet custom requirements.” — Spring Security
However, for basic needs writing a few lines of code to implement your authentication logic might be a better approach. This way, you can keep your application simple and avoid unnecessary dependencies.
Technology Bishop, Software Engineer & Technical Writer Hire me: https://antonellozanini.com/