As the Log4J Problem swarmed the Internet, I’ve been thinking about the possible – Solutions. But, I found a blog post that pretty much covered it https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot. Solution for the older versions, Application Server Administrators could remove the unused Appenders from the Jar File. If an app is logging only to Files or to Console,…
Logging User Actions
Tracking and Logging user Actions is essential and even critical part of too many areas and in so many layers of an Application. Just look up – how many applications are affected by the Log4J bug – Tesla, the Voice Assistants, a lot of known and unknown Server Applications. Debugging & Development Software Development stage…
Logging Best Practices
In the list of Logging best practices is to have the possibility to detect different events and situations in a software system. When such modules are installed, finding what is important could be completed even while the application is running and without stopping it. Logging – On/Off Switch It is a good practice to be…
What is Bitcoin?
Bitcoin is a combination of several technologies – it is a balance sheet with who owns how much a torrent system and several algorithms that safeguard it. Bitcoin is a Spreadsheet Yes it is a little bit hidden with Pseudo names and addresses. But it is also public and open to participants to review. What…
Design Architectures or Coding small Modules
The whole human existence makes you think in the small detail and modules and it doesn’t matter how big perspective and you have on Architectures of the society. It is somehow similar to the endless philosophical and spiritual battles between. Infinite and limited Philosophy/theory and practice Design Architectures This way of thinking inescapably is valid…
User & Role Management – The Core App Feature
The User Management is the most Fundamental Functionality of absolutely every Application and platform around the Internet and technology. It doesn’t matter the additional layers, wrappings, contexts and domain areas. You can read that I have touched the topic before in my articles are you in control of your technology, implementation of the same programming…
NFT Minting App Development – steps in more detail
In this article I’m gonna lay out some NFT Minting App Development. These are Baby Steps that follow some “best practices” and guidelines that actually come from the “first principles”. In software development currently the recommended way is – separating apps independently or some kind sort of Micro Services. You could read more about that…
What’s NFT Metadata?
NFT Metadata is defined well in the Ethereum documentation that could be found on this address https://eips.ethereum.org/EIPS/eip-721. There are also several external places – platforms, services and companies that try to do something on it: NFT Guide: How To Read Metadata To Snipe Rare Traits – by Huhao – NFT Caviar (substack.com) Developer Quick-Start: NFTs…
The Blockchain has even more Points of Failure
If you read only the headlines you may find some technologies pure magic but in my personal practical technological experience, The blockchain introduces even more points of failure. Hosting files The new way of storing data that is unchangeable and secure from manipulation is by delegating files to hash based storage system. You could run…
The Problem of Software vs Software Problem
There are few real Problem in software that could be considered unsolvable: Unresolvable Problems Some very complex mathematical challenges unresolved over the years. One very famous solution was the Byzantine Generals Problems – Resolved by Satoshi Nakamoto. It is sometimes extremely hard to bringing into a formal model – some real world phenomena. Gravity, thermodynamics,…
