@psoszynski Profile picture

Przemek Soszynski

@psoszynski

dotnet core, Microsoft Azure, Security, neo4j, quality

Joined October 2008
Similar User
Ed McPadden photo

@emcpadden

Stavros Skamagkis photo

@stavrossk

Pure Krome photo

@purekrome

Dan Cunningham photo

@sintaxasn

CharithWiki photo

@charithwiki

robert curlette photo

@robrtc

zell71 photo

@zell71

Przemek Soszynski Reposted

Huge congrats to @AIatMeta on the Llama 3.1 release! Few notes: Today, with the 405B model release, is the first time that a frontier-capability LLM is available to everyone to work with and build on. The model appears to be GPT-4 / Claude 3.5 Sonnet grade and the weights are…


Przemek Soszynski Reposted

How to improve API performance? Here are 5 tips: 1. 𝗣𝗮𝗴𝗶𝗻𝗮𝘁𝗶𝗼𝗻 Pagination is a common optimization technique when result sets are large. By streaming results back to the client in pages, service responsiveness can be improved. 2. 𝗔𝘀𝘆𝗻𝗰𝗵𝗿𝗼𝗻𝗼𝘂𝘀…

sahnlam's tweet image. How to improve API performance?

Here are 5 tips:

1. 𝗣𝗮𝗴𝗶𝗻𝗮𝘁𝗶𝗼𝗻

Pagination is a common optimization technique when result sets are large. By streaming results back to the client in pages, service responsiveness can be improved.

2. 𝗔𝘀𝘆𝗻𝗰𝗵𝗿𝗼𝗻𝗼𝘂𝘀…

Przemek Soszynski Reposted

Understanding JSON Web Tokens (JWT) JWTs are a compact and self-contained method for securely transmitting information between parties as a JSON object. Let's break this down: 1. 𝗝𝗦𝗢𝗡 stands for JavaScript Object Notation - a lightweight data interchange format that is easy…

sahnlam's tweet image. Understanding JSON Web Tokens (JWT)

JWTs are a compact and self-contained method for securely transmitting information between parties as a JSON object. Let's break this down:

1. 𝗝𝗦𝗢𝗡 stands for JavaScript Object Notation - a lightweight data interchange format that is easy…

Przemek Soszynski Reposted

Trying to choose the right #Azure compute service for your application? Dive into Azure #AppService, Azure #KubernetesService (AKS), and more to find the perfect fit. See more here: msft.it/6015YArOl

AzureSupport's tweet image. Trying to choose the right #Azure compute service for your application? Dive into Azure #AppService, Azure #KubernetesService (AKS), and more to find the perfect fit. See more here: msft.it/6015YArOl

Przemek Soszynski Reposted

Design Patterns Cheat Sheet

milan_milanovic's tweet image. Design Patterns Cheat Sheet

Przemek Soszynski Reposted

Understanding OAuth 2.0 OAuth is an open standard that allows users to grant limited access to their data on one site to other sites or applications without exposing their passwords. It has become the backbone of secure authorization across the web and mobile apps. 𝗧𝗵𝗲…

sahnlam's tweet image. Understanding OAuth 2.0

OAuth is an open standard that allows users to grant limited access to their data on one site to other sites or applications without exposing their passwords. It has become the backbone of secure authorization across the web and mobile apps.

𝗧𝗵𝗲…

Przemek Soszynski Reposted

Top 8 Cyberattacks

SecurityTrybe's tweet image. Top 8 Cyberattacks

Przemek Soszynski Reposted

Oauth 2.0 Explained With Simple Terms. OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. The entities involved in OAuth are the User, the Server, and…

alexxubyte's tweet image. Oauth 2.0 Explained With Simple Terms. 

OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. 
 
The entities involved in OAuth are the User, the Server, and…

Przemek Soszynski Reposted

Top 12 Tips for API Security - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation – Subscribe to our weekly…

sahnlam's tweet image. Top 12 Tips for API Security

- Use HTTPS
- Use OAuth2
- Use WebAuthn
- Use Leveled API Keys
- Authorization
- Rate Limiting
- API Versioning
- Whitelisting
- Check OWASP API Security Risks
- Use API Gateway
- Error Handling
- Input Validation

–
Subscribe to our weekly…

Przemek Soszynski Reposted

REST API Cheatsheet It covers: ✅ The six fundamental principles of REST API design ✅ Key components like HTTP methods, protocols, and versioning ✅ Practical tips on pagination, filtering, and endpoint design – Subscribe to our weekly newsletter to get a Free System Design…

sahnlam's tweet image. REST API Cheatsheet

It covers:

✅ The six fundamental principles of REST API design
✅ Key components like HTTP methods, protocols, and versioning
✅ Practical tips on pagination, filtering, and endpoint design

–
Subscribe to our weekly newsletter to get a Free System Design…

Przemek Soszynski Reposted

A Visual Overview of Kubernetes Containers revolutionized modern application development and deployment. Unlike bulky virtual machines, containers package up just the application code and dependencies, making them lightweight and portable. However, running containers at scale…

sahnlam's tweet image. A Visual Overview of Kubernetes

Containers revolutionized modern application development and deployment. Unlike bulky virtual machines, containers package up just the application code and dependencies, making them lightweight and portable. However, running containers at scale…

Przemek Soszynski Reposted

REST API Cheatsheet It covers: ✅ The six fundamental principles of REST API design ✅ Key components like HTTP methods, protocols, and versioning ✅ Practical tips on pagination, filtering, and endpoint design – Subscribe to our weekly newsletter to get a Free System Design…

sahnlam's tweet image. REST API Cheatsheet

It covers:

✅ The six fundamental principles of REST API design
✅ Key components like HTTP methods, protocols, and versioning
✅ Practical tips on pagination, filtering, and endpoint design

–
Subscribe to our weekly newsletter to get a Free System Design…

Przemek Soszynski Reposted

Three pillars of observability: logging, tracing, and metrics. 🔹 Logging Logging involves recording discrete events within a system, such as incoming requests or database accesses. It typically generates high volumes of data. The ELK stack (Elasticsearch, Logstash, Kibana) is…

sahnlam's tweet image. Three pillars of observability: logging, tracing, and metrics.

🔹 Logging
Logging involves recording discrete events within a system, such as incoming requests or database accesses. It typically generates high volumes of data. The ELK stack (Elasticsearch, Logstash, Kibana) is…

Przemek Soszynski Reposted

Symmetric vs Asymmetric Encryption Symmetric encryption and asymmetric encryption are two types of cryptographic techniques used to secure data and communications, but they differ in their methods of encryption and decryption. 🔹 In symmetric encryption, a single key is used…

sahnlam's tweet image. Symmetric vs Asymmetric Encryption

Symmetric encryption and asymmetric encryption are two types of cryptographic techniques used to secure data and communications, but they differ in their methods of encryption and decryption.

🔹 In symmetric encryption, a single key is used…

Przemek Soszynski Reposted

Top Architectural Styles In software development, the architecture you choose plays a key role in shaping a system's structure and behavior. It lays out a blueprint showing how different pieces will fit together to make the software work. Architectural styles offer proven…

sahnlam's tweet image. Top Architectural Styles

In software development, the architecture you choose plays a key role in shaping a system's structure and behavior. It lays out a blueprint showing how different pieces will fit together to make the software work. Architectural styles offer proven…

Przemek Soszynski Reposted

What Does ACID Mean? Below is a breakdown of the ACID properties, which are critical to the operations of database transactions. 🔹 Atomicity A transaction is a single unit of operation – either all its data modifications are performed, or none are. If a fault occurs during the…

sahnlam's tweet image. What Does ACID Mean?

Below is a breakdown of the ACID properties, which are critical to the operations of database transactions.

🔹 Atomicity
A transaction is a single unit of operation – either all its data modifications are performed, or none are. If a fault occurs during the…

Przemek Soszynski Reposted

API vs SDK: Key Differences APIs (Application Programming Interfaces) and SDKs (Software Development Kits) are essential tools for software development, but they serve different purposes: 𝗔𝗣𝗜 An API is a set of rules and protocols that allows different software applications…

sahnlam's tweet image. API vs SDK: Key Differences

APIs (Application Programming Interfaces) and SDKs (Software Development Kits) are essential tools for software development, but they serve different purposes:

𝗔𝗣𝗜
An API is a set of rules and protocols that allows different software applications…

Przemek Soszynski Reposted

Top 12 Tips for API Security - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation – Subscribe to our weekly…


Przemek Soszynski Reposted

Are you considering writing web apps in a different language? Let me suggest C#. I bet #Blazor will make you reconsider. Your mind will be blown.💥💥


Przemek Soszynski Reposted

How do companies ship code to production? The following describes a typical software delivery workflow. Companies have diverse environments using different tools. This is one representative workflow that demonstrates some common practices. Details will differ across…


United States Trends
Loading...

Something went wrong.


Something went wrong.