Sign in

An enthusiast programmer that likes to work with backend, but also enjoys to work with new web-application frameworks.
Photo by Thomas Martinsen on Unsplash

There was a small talk when Raffaele tell us what he did in this corona time. So he started working with ML and also Code Generation driven by ML.

There was also a talk about how ML was involved in the industry. For example, every machine now starts having more user-friendly interfaces and through this more things can be automated to provide a much greater experience to end customers. And also to the factories that can apply ML to simulate a result before creating and applying those concepts.

Power your .NET application with the new generation of diagnostics — March…

Photo by Thomas Martinsen on Unsplash


The first conference day started with Dino Esposito discussing that it matters more the soft skills and the pragmatic way to approach problems rather than the used technology, like .NET.
In a sports business, the money comes from the data, that is applied to the sportsmen and women. All the things that we are seeing on TV look so simple, but all of them are based on data. “Data is gold”.

Data Science is only an umbrella because we need engineering to apply the science and make it available. …

Previous article republished this week

RabbitMQ Exchange with Docker in

This is the second article from a series of four about RabbitMQ Exchange in .NET. In the first part of this article, the fundamentals and the types of Exchange will be presented. And in the second

Kick off your day with a reading about tech topics and news. In our most recent project,, we gathered ideas and knowledge from IT professionals and educators. What’s the next subject you want to read about? — Source

Library of the week

A lightweight library for the Business Layer for processing requests coming from Presentation Layer.

Previous article republished this week

RabbitMQ Producer with Docker in

This is the first article from a series of four, where I will explain each RabbitMQ graph node, the environment setup with Docker and the Producer creation in .NET. IntroductionRabbitMQ it’s a…

One question that intrigued me this week

What do you think about this tweet? Does tech Twitter is dying? Maybe we as tech people should move to specific content platforms like Twitter will be more like a gateway through which we’ll share our ideas and news. Or there will be proportional tech content on Twitter. And I like this idea, on Twitter I would like to…

Previous articles republished this week.

Angular Ivy performance
Angular announces their new Ivy compiler, with smaller bundle sizes, so I wanted to find out on a real project how much the bundle size and the overall application performance were improved. After see

Photo by david laws on Unsplash



  • The attitude of software craftsmanship should be: passion, career ownership, “perfect” practice and boy scout rule;
  • We should produce more to receive more, and not waiting to receive something from our company because we are owning our career;
  • When we are working on an organization don’t excuse, like “No one does that, so I’m not going to do it also”. Either you do it or you leave the company;
  • A good developer is not Java, C# or Ruby developer. A good developer is a developer. We use the tools that we find useful for our job;


  • In February…

Photo by Bernard Hermant on Unsplash

After the authentication was presented in the previous two articles using Symmetric and Asymmetric keys, then this article is about authentication, much more exactly about Claims and Roles. In the first part, there will be an introduction about the core concepts of the JWT Claims and in the second part the actual implementation.

JWT Authentication with Symmetric Key:
JWT Authentication with Asymmetric Key:


Claims in JWT Token are used to store key data (e.g. username, timezone, or roles) in the Token payload, besides the IssuedAt (i.e. iat), which is added by default.
In .NET Core, Claims can be used…

Photo by Mitchell Luo on Unsplash

In the previous article I wrote about JWT Authentication using a single security key, this being called Symmetric Encryption. The main disadvantage of using this encryption type is that anyone that has access to the key that the token was encrypted with, can also decrypt it. Instead, this article will cover the Asymmetric Encryption for JWT Token.
In the first part of this article, the Asymmetric Encryption concept will be explained, and in the second part, there will be the implementation of the JWT Token-based Authentication using the Asymmetric Encryption approach by creating an “Authentication” Provider in ASP.NET Core.



Photo by Andre Manik on Unsplash

JWT Authentication is becoming one of the most used authentication types in modern web application or services. This article covers the JWT Authentication with a Symmetric Key in ASP.NET Core. In the first part, there will be a short introduction into what Symmetric Key represents and the second part contains the prerequisites for this project and the actual implementation of this authentication type.
This article is the first article from of series of two, the second one will contain the authentication with an Asymmetric Key using a certificate.


JWT Token is a common way of creating access tokens that can…

Photo by Markus Spiske on Unsplash

This article contains another approach of consuming messages. The first part will be a comparison between the several types of consuming messages and in the second part, each line of code will be explained.
The entire environment setup with Docker can be found in the first article from the RabbitMQ series. In this series, there are also explained some core principles about each RabbitMQ node. I highly recommend that, if you are at the beginning with RabbitMQ or with the AMQP standard, to start with these articles:



The RabbitMQ Client provides a Received event that will…

Eduard Stefanescu

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store