profile

Hi there, I’m Ram

If you're starting in software engineering or an experienced professional, I post informative content around stuff I work with - Full Stack Development. Subscribe to my newsletter to receive my latest posts.

Featured Post

Understanding SOLID - Liskov Substitution

Hello there, Hope you are doing good. In this week's newsletter, I want to introduce you to the third principle of the SOLID principles: five principles describing few fundamental rules for developing arguably ideal software components which are scalable, extensible, robust and flexible - the Liskov Substitution Principle. This principle can be termed as one of the basic foundations of the Object Oriented Design languages which talks mainly about substitutions and inheritance. The principle...

Hello there, Hope you are doing good. In this week's newsletter I want to introduce you to one of the most efficient internal sorting algorithm, and discuss how to implement it - Quicksort algorithm step by step with an example and analyze time complexity. Quick Sort is an internal sorting technique which can be used to arrange a given set of unordered dataset into required order. It is the most efficient internal sorting technique, which doesn’t use any auxiliary memory (or additional space...

Hello there, Hope you are doing good. In this week's newsletter, I want to introduce you to the fourth principle of the SOLID principles - Interface Segregation. In the early stages of application development, it’s common to place all logic into a single class. As the application grows, these classes become bloated or “fat” with unrelated responsibilities. Later, when we try to extract interfaces from these classes for modularity or extension, we may end up with interfaces containing many...

Hello there, Hope you are doing good. In this week's newsletter I want to introduce you to the SOLID principles, and the fifth principle in particular - the Dependency Inversion principle. Most of the modern day programming frameworks use Dependency Injection mechanism. Fun Fact - Do you know that Dependency Injection concept has in one way evolved from the Dependency Inversion principle? Click to open the full article here I hope this content will be useful to you. Follow me on Facebook,...

Hello there, Hope you are doing good. Token based Authentication is one of the most popular and widely used authentication and identity management systems used across the world. It is simple, easy to integrate and makes user experience better. Applications can decouple User Identity and Authentication layer to an externalized Authorization Server layer and delegate authentication to this server. You will only enter credentials at a centralized Identity Provider site and the application...

Hello there, Hope you are doing good. I wanted to share some interesting news to you. You want to add authentication to secure your resources, authorize access, implement CORS policies, enforce HTTPS, or even cache responses – you will add the respective built-in libraries to the web application. These are all exposed by the ASP.NET Core framework as Middleware – pieces of code blocks that are responsible for a single functionality. Announcing my new digital product - "How to work with...

Hello there, Hope you are doing good. This week, I want to introduce you to the 3 caching patterns that we generally use to implement Caching in our applications. We choose a caching pattern that best fits our application based on its behavior, business requirements and tolerance. The following are the 3 popular patterns used for caching in microservices. Cache-Aside The cache is lazy loaded with data only when needed and is not available in the cache. The microservice decides if the data...

Hello there, Hope you are doing good. This week I want to introduce you to Authorization and How to implement Authorization for a Web API in ASP.NET Core. .NET provides us with 3 ways of implementing Authorization depending on the requirement and the use-cases. In this article, I touch base on all the 3 mechanisms with explaining examples, so you don't need to look up for another content. Article Link - https://codingramen.com/blog/how-to-authorize-requests-in-asp-net-core-web-api/ I hope you...

Hello there, Hope you are doing good. This week I want to introduce you to Docker and 5 commands you must know to started. What is Docker? Docker is a Container Runtime. It helps you build and run Containers based on the custom Image you build. When you use Docker as a Runtime to build and run your Containers, those containers are called Docker Containers. You can build, run and manage containers in Docker via Docker Commands. Here are the top 5 commands you must know to get started docker...

Hello there, Hope you are doing good. Distributed architecture is a norm these days. The Front-end, Back-end and the Database tiers are separated into independent deployments to be able to scale as required. This means that the Front-end and the Back-end run in different servers and generally own different domain names. This leads to a situation where the Front-end requests are naturally blocked by the Back-end framework due to a general policy called CORS. This week I want to share with you...