From API Design Patterns by JJ Geewax
This article covers…
How the custom Purge method can be used to delete matching resources
Why the custom Purge method is dangerous and should be avoided if possible
A variety of safety precautions to avoid accidentally deleting more data than intended
How to address concerns about consistency in the matching result set
From API Design Patterns by JJ Geewax
This article covers:
How to manage many-to-many relationships implicitly, without an additional association resource.
The benefits and drawbacks of implicit rather than explicit association
How to use custom methods to associate resources together
Handling issues with data integrity of associated resources
This article shows ways to synch your architecture to your team composition for a new project, and how to start planning your project.
In this video, security expert Neil Madden explains self-contained tokens and JWTs in detail.
Security expert Prabath Siriwardena shows you how to secure Microservices with Istio Service Mesh.
From Spring Security in Action by Laurentiu Spilca In this article, we discuss the components which act in an OAuth 2 authentication implementation. You need to know these components and the role they play in order to properly implement them…. Continue Reading →
From Code like a Pro in C# by Jort Rodenburg
This article gives an overview of exactly how C# code is compiled.
From ASP.NET Core in Action, Second Edition by Andrew Lock
This article discusses the advantages of ASP.NET Core and why you should (or shouldn’t) choose to use it for your application.
From Designing APIs with Swagger and OpenAPI by Josh Poenlat
This article covers:
• Informal vs Formal descriptions
• Learning about the OpenAPI specification
• Learning about YAML ( as a easier-to-write JSON )
• Describing our first GET operation