Data: An Executive Briefing

The term "data" has gained significant prominence recently, leading to the emergence of numerous fields of study and job positions. Now, we encounter terms such as Data Strategy, Data Culture, Data Governance, Data Driven, Data Lake, Data Warehouse, and Big Data. But what does each of these terms...
READ MORE

How the Mulesoft JWT Validation Policy Works

This article will delve into the details of the Mulesoft JWT Validation policy. It is intended for advanced users with a comprehensive understanding of the platform's internal operations. The goal is to provide a concise overview of the policy's inner workings.

READ MORE

Sometimes AI Is Not the Solution

Artificial Intelligence (AI) is a term that is popping up everywhere right now. The media is talking about how AI can change our future and how complex the solutions AI can provide in a blink of an eye.

READ MORE

How to Use Redis Cache to Prevent DDoS Attacks

In 2019, I worked at an investment bank in the city of São Paulo. Every day, our systems processed millionaire transactions, and our general motto was "stability and security."

One of the precautions we took was to prevent DDoS (Denial of Service) attacks. Although cloud platforms guarantee they...

READ MORE