Create a WC clone with Golang

I’ve been using Golang in the past months, and I was very happy about it, this language makes me feel entertained and productive and the same time. Studying for me is a lifelong journey, and with that in mind, I decided to keep using it for another challenge/project that I found quite simple but interesting.
You’ll see! I spent some of my free time on it and today, I’d like to share with you which route I took to accomplish it.
Let’s start!

»

Buildpacks - 3 months later

Since the beginning of my career in this industry, I’ve always been fascinated by the open-source world.
After so many years of contributing on my own, this year, I finally joined for 3 months an open-source team within VMware and discovered how an open-source team works.
In this article, I’m going to tell you more about this open-source journey and how it went. Let’s go! 🚀

»

Safeguarding Software: Embracing Security Design Principles in Software Development

In today’s digital landscape, developing software with a security-oriented mindset is no longer an option – it’s a top priority.
I’ve had the opportunity to attend the Secure Software Development Fundamentals Course by the Open Source Security Foundation, and I found it enlightening and a must for passionate Software Engineers.
So today, I’m going to talk about a set of widely recommended Security Design Principles that serve as invaluable rules of thumb for developing software with security-first in mind.
Let’s start! 🚀

»

Misleading Pair Programming

I often read tweets, threads and posts about a weird practice called Pair Programming, full of complaints. But I find this usually due to a lack of understanding and improper implementation.
I’d like to clarify why those complaints are misleading and why you shouldn’t write pair programming off completely.

»

How to mock with Jest and Typescript

As an Extreme Programmer I used to jumping often into different engagements, each of them has challenges I need to overcome and problems I need to solve.
This time I jumped into an engagement with a legacy codebase composed mainly by AWS lambdas written in Typescript. Language and technology I’ve never used before.
How can I learn the language and at the same time being able to quickly deliver value?
The answer in my head was clear: let’s create some tests, the rest will follow!

»

The Fifteen-Factor App

Have you ever wondered how to deliver good Software As A Service? Nowadays, as developers, we spend most of our time delivering software as a service, but it brings a lot of uncertainties about how to do it properly. Do you know that we already have 15 tips that can help us to achieve that visionary goal?
I’ve been reading a lot about it, and I decided to summarise them in a small article. Let’s dig deeper and find more about this methodology and the fifteen factors which belong to it…

»

Distributed Tracing

Recently I’ve seen a thread on Twitter regarding distributed tracing systems. I recognise that sometimes it’s an underestimated topic, so I thought to write a short and introductory article about it…

»

Stop the data mess with the data mesh

One of the hottest topics of the moment in Big Data is undoubtedly the Data Mesh, but what is it? Why is this better than the solutions we had before? Do we need it? Should we adopt it?

»

Hacktoberfest 2020

Ah shit, here we go again. Another year passed, and another Hacktoberfest is over. I’ve just received my swag, and I can’t be more excited!

»

Your codebase is your garden

I always liked the your codebase is like a garden metaphor, it says that writing software is like gardening, you have to take care of your garden in many ways and from time to time you have to move plants around relative to each other, consider how to take advantage of the wind, rain and sunlight to help your plants grow and stay healthy. Every day you have to monitor them and make adjustments as needed. Like your code. But how can we do it in practice and become good gardeners?

»

Consumer Driven Contracts

During our journey as developers, we often have to use external APIs, integrate our systems with them and be sure that everything works smoothly, sometimes it becomes difficult because suddenly the systems we are interacting with change their behaviour, breaking our integration.
How to prevent it?

»

Hacktoberfest 2019

My usual post of the year about the Hacktoberfest is back! Even this year I participated in it and gained some swags and an amazing t-shirt ~

»

Hack Week 2019

Another week is over, here in ThoughtWorks Barcelona but this time it was different from the others, it was full of new ideas and teams, at the end of it that was even a prize, a winner and a celebration. Are you wondering what’s going on, right?

»

Incident Management 101

What’s an incident? What to do in case of an incident? How to be a great incident commander? Are you a good incident responder? This is what I discover during my Incident Management workshop in @ThoughtWorks this week, let’s take a look!

»

Hacktoberfest 2018

Last year, as the previous one I partecipated to the Hacktoberfest and of course I received a lot of swag, do you want it too? ~

»

Stairway to vim

Today I started to work on a Scala project, I spend most of my time using vim (or in this case neovim) so I started to looking for plugins to write Scala using [neo]vim.

»

Opus to Audio

For a tons of personal reasons I don’t use Whatsapp, I prefer Telegram instead but often I need to listen some audio files from Whatsapp that are in OPUS so to listen it I need to convert it, so boring, isn’t it? So I wrote a Telegram’s bot to convert it for me but better.

»

Glip

Using more than one device often I need to move some links or some datas from to another one, I need a simple and clean way to do that without logins, emails, codes and hard to remember links so I thought how to solve my problem using golang…

»

Go-ofile

The first phase in security assessment is focused on collecting as much information as possible about a target application. One tool to do that is Goofile, it allows to search a specify filetype in a specify domain using Google…

»

Go-odbye

One of the worst things that can be happens to a twitter user is surely to be unfollows but how to discover who unfollow you ? To solve this problem I create an ad-hoc offline and commandline tools to do that.

»

Hello World, NUCLEO

For academic purposes now I own a NUCLEO-F401RE board by ST Microeletronics, it works with STM32 microcontrollers, it is arduino compatible, supported by MBED, it has 3 leds and 2 pushbuttons on board; Obviously is fully programmable… but how ? Let’s do it!

»

ToxiProxy node client

I saw on github a nice tool to test my applications under certain networks and system condition to prove that my tests never fail…

»

SmagenBot

I use Telegram, whatsapp alternative messaging application, it contains more features than whatsapp and many benefits, one of these is the possibility to create bots and to try it I decided to make one just for fun.

»

The exploit that exploits you

At some point who is interested to become a programmer spend some time on the underground part of the field: the security field, in fact at least one time we played with exploits, bugs and vulnerabilities, at least one time we wanted to be a security professional.

»

Unlimited Kiko Coupon

A few weeks ago I saw a Facebook application that allows to get a coupon to receive a “free nail varnish”, it’s very simple and clear: Put a “like”, insert yours data and done, you will receive your coupon and your free nail varnish, but there is a limitation: You can take it only once…. maybe.

»

Ostega, steganography using OpenCV libraries

The steganography1 is a technique that allows to “hide” information inside an image or an audio files, it’s a very interesting security field, I can hide “secrets” into an image, pass it to my friend, and he, using a decoder can read what I wrote. Very useful to keep my “secrets” secret; so I wrote a simple C library to hide words into a bitmap images using the OpenCV libraries just for fun and profit…

»