Stars
An immutable SQL database for application development, time-travel reporting and data compliance. Developed by @juxt
Automated documentation for event-driven applications built with Spring Boot
High-performance JSON masker library with no runtime dependencies
Repository for the AKS Landing Zone Accelerator program's Automation reference implementation
Azure Messaging Replication Tasks with .NET Core
Terraform Best Practices free ebook translated into ๐ฌ๐ง๐ฆ๐ช๐ง๐ฆ๐ง๐ท๐ซ๐ท๐ฌ๐ช๐ฉ๐ช๐ฌ๐ท๐ฎ๐ฑ๐ฎ๐ณ๐ฎ๐ฉ๐ฎ๐น๐ฏ๐ต๐ฐ๐ท๐ต๐ฑ๐ท๐ด๐จ๐ณ๐ช๐ธ๐น๐ท๐บ๐ฆ๐ต๐ฐ
Embedded specification language & model checker in Haskell
Identifies and prioritizes God Classes Highly Coupled classes, and Class Cycles in Java codebases you should refactor first.
Full Modular Monolith application with Domain-Driven Design approach.
An example approach for implementing a Clean/Hexagonal Architecture
97 Things Every Agile Software Developer Should Know
Eclipse OpenJ9: A Java Virtual Machine for OpenJDK that's optimized for small footprint, fast start-up, and high throughput. Builds on Eclipse OMR (https://github.com/eclipse/omr) and combines withโฆ
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Code samples for my book "Neural Networks and Deep Learning"
pss is a power-tool for searching inside source code files.
A tool for exploring each layer in a docker image
jOOฮป - The Missing Parts in Java 8 jOOฮป improves the JDK libraries in areas where the Expert Group's focus was elsewhere. It adds tuple support, function support, and a lot of additional functionalโฆ
EA Async implements async-await methods in the JVM.
โญ๏ธ Companies that don't have a broken hiring process
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Here we provide an ipython notebook to attempt to reproduce the claims made about LIGO data in:
Free cross-platform password manager compatible with KeePass
Automatically generated diagrams and animations for Scala data structures
Attribute-Based Access Control with Spring Security