Data: An Executive Briefing

The term "data" has gained significant prominence recently, leading to the emergence of numerous fields of study and job positions. Now, we encounter terms such as Data Strategy, Data Culture, Data Governance, Data Driven, Data Lake, Data Warehouse, and Big Data. But what does each of these terms mean?
READ MORE

How the Mulesoft JWT Validation Policy Works

This article will delve into the details of the Mulesoft JWT Validation policy. It is intended for advanced users with a comprehensive understanding of the platform's internal operations. The goal is to provide a concise overview of the policy's inner workings.

READ MORE

Sometimes AI Is Not the Solution

Artificial Intelligence (AI) is a term that is popping up everywhere right now. The media is talking about how AI can change our future and how complex the solutions AI can provide in a blink of an eye.

READ MORE

How to Use Redis Cache to Prevent DDoS Attacks

In 2019, I worked at an investment bank in the city of São Paulo. Every day, our systems processed millionaire transactions, and our general motto was "stability and security."

One of the precautions we took was to prevent DDoS (Denial of Service) attacks. Although cloud platforms guarantee they will not have DDoS problems because their systems are robust and scalable to handle a large number of requests (with a large amount of money), we did not want the bank to spend an absurd amount of money if they suffered such an attack.

READ MORE

The Risks of Blindly Trusting Code Generated by Artificial Intelligence

Today, we will discuss ChatGPT and the dangers of blindly trusting code generated by artificial intelligence. The same risks exist when developers intentionally copy other developers' code without analyzing the code's actual functionality. How does ChatGPT's code quality fare when it comes to security?

READ MORE