Rob Janssen

All | Unread | Read

How to Design a Scalable Rate Limiting Algorithm

Rate limiting protects your APIs from inadvertent or malicious overuse by limiting how often each user can call the API. Without rate limiting, each user may make a request as often as they like, leading to “spikes” of requests that starve other consumers.

Thetips4you

Welcome to Thetips4you. Through this channel I would like to share hands on experience on new age Technology like Splunk, Docker, DevOps, Jenkins, Grafana, P...

Update

This is the github repo for the IETF draft surrounding the topic of new time-based UUID formats. Various discussion will need to occur to arrive at a standard and this repo will be used to collect and organize that information.

String Interpolation in C# 10 and .NET 6

Text processing is at the heart of huge numbers of apps and services, and in .NET, that means lots and lots of System.String. String creation is so fundamental that a myriad of ways of creating them have existed since .NET Framework 1.0 was released, and more have joined the fray since.

Functional Programming with C# - Simon Painter - NDC Oslo 2020

Functional Programming is becoming increasingly popular and relevant with each year that goes by. With so much discussion around languages such as F#, Haskell and Erlang, it can seem as though getting started with Functional programming would mean first learning a whole new syntax...but what if it d

Post

I have been maintained a legacy distributed timer for months for my employer, then some important pay business are leveraging on it, with 1 billion tasks handled every day and 20k tasks added per second at most.

Query Optimization Techniques in SQL Server: Parameter Sniffing

To view and analyze SQL Server query execution plans, for free, including comparing plans, stored procedure performance profiling, missing index details, lazy profiling, wait times, plan execution history, check out ApexSQL Plan

Permission-Based Security for ASP.NET Web APIs

Protecting a Web API from unauthorized users is the first step to get control over who can access it. However, simply excluding anonymous users may be insufficient in some situations. You may need to control over who can do what on your application.

What Is a Specification Pattern?

You need to select, validate, or add constraints to your domain. Specification pattern, in a clear OOP way, does the before-mentioned. Let’s go into details. Next up, specification pattern in Java.

.NET 5 REST API Tutorial - Build From Scratch With C#

Learn how to create a REST API end-to-end from scratch using the latest .NET 5 innovations and Visual Studio Code. The API will be written in C#. ?? Get the code: https://youtube.dotnetmicroservices.com/net5restapi-10 ?? Course developed by Julio Casal. Check out his channel: https://www.you

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.