@martin.kleppmann.com I'm seeing that there is an upcoming second version of the Designing Data Intensive Applications book. Is the second book usable on its own or is it an complementary with the first edition?
@martin.kleppmann.com I'm seeing that there is an upcoming second version of the Designing Data Intensive Applications book. Is the second book usable on its own or is it an complementary with the first edition?
@garnier.wf I am wondering. I'm working on Spring Security stuff, and once again, I am struggling. If you accept multiple jwts from issuers (internal, and user facing), would you either make a composite jwt decoder or create a filter chain per case? So an internal chain and a user chain?
Weβre working on BitBucket, and with all the recent upgrades it steps up into GitHub. And I already experienced the instability of GH, I am not really missing it.
In the meanwhile GH/MS is pushing AI, maybe first push reliability β¦
Arent they optimizing for the wrong good?
Dat lijkt toch echt verdomd veel op.. Interessant platform