PinnedAuthenticate users in your webapp with Azure Active Directory as IDP and Keycloak as SPLearn how to use Keycloak to authenticate users in a javascript client application and delegate authentication to Azure Active Directory…Feb 8, 2021Feb 8, 2021
How to identify rows added by GROUP BY ROLLUP?Using rollup in SQL queries allows you to include extra rows that represent the subtotals.Sep 18, 2023Sep 18, 2023
Simulate Partial Rollup with Rollup and Grouping SetsNot all SQL databases support the Partial Rollup SQL syntax. For the record, Partial Rollup reduces the number of subtotals produced by the…Sep 3, 2023Sep 3, 2023
Authenticate as an end user a Spring Boot app for access to the BigQuery APIThis guide explains how web server applications written with Spring Boot can use Google OAuth 2.0 endpoints to implement OAuth 2.0…Sep 20, 2022Sep 20, 2022
How fast can you read a large csv file and compute min, max, average aggregation out of it (Part 2)This is the second part of the series “How fast can you compute the average, min and max of values read from a very large csv file”Oct 20, 2021Oct 20, 2021
How fast can you read a large csv file and compute min, max, average aggregation out of it (Part 1)Reading files is a common problem every developer has to solve once in his life. Providing a quick solution is easy but an effective one?Oct 20, 20211Oct 20, 20211
How to get access token from Keycloak using Postman — OAuth2Here’s how to setup Postman to authenticate on Keycloak using a public client and the Authorization Code grant type.May 27, 20212May 27, 20212
Why Double-Checked Locking is STILL BrokenThis story is a follow-up of this article https://www.cs.umd.edu/~pugh/java/memoryModel/DoubleCheckedLocking.html (DCL) signed by famous…Aug 16, 2020Aug 16, 2020