Erçin DedeoğluStatSniper: Hassle-Free Monitoring ToolDeploy in seconds: StatSniper, the lightweight, cross-platform tool for real-time system monitoring. Open-source and easy with Docker.3 min read·Mar 15, 2024----
Erçin DedeoğluinTowards DevNavigating the Address Parsing with PostalizedDeploy Postalized via Docker for quick address parsing and expansion in your apps — easy setup, robust API, open-source flexibility.2 min read·Nov 10, 2023----
Erçin DedeoğluinTowards DevWhy do we say Leader Election algorithms evolved from master-slave?Two types of coordination: - Master-slave - Leader Election1 min read·May 8, 2023----
Erçin DedeoğluWhat is a WebSocket?Think about this: you’re designing a website or an application and want it to maintain constant, two-way communication with another system…2 min read·May 5, 2023----
Erçin DedeoğluinLevel Up CodingAn Overview of Native Ahead-of-Time (AOT) Compilation in .NETDiscover the power of Native Ahead-of-Time (AOT) compilation in .NET, reducing memory usage, improving startup time and battery life.2 min read·Feb 23, 2023----
Erçin DedeoğluBreaking into the Male-Dominated World of CybersecurityChallenges faced by women in the cybersecurity industry and highlights the importance of diversity and positive discrimination.4 min read·Feb 18, 2023----
Erçin DedeoğluinSystem WeaknessCaught in the Middle: Understanding and Preventing DEFI Sandwich AttacksWe explore the ins and outs of DEFI sandwich attacks, a growing threat to the security of DEFI platforms.4 min read·Feb 17, 2023----
Erçin DedeoğluWhy CQRS May Not Be the Best Choice for Your Software Development ProjectCQRS is an architectural pattern that has become increasingly popular in recent years.3 min read·Feb 16, 2023----
Erçin DedeoğluHow did it feel about learning JavaScript in 1999?Learning JavaScript in 1999 was a unique experience.6 min read·Feb 14, 2023----
Erçin DedeoğluinSystem WeaknessThe Pitfalls of JWT Authentication: Why Stateful Sessions are the Safer OptionAre you tired of reading tutorials recommending JWT as the best authentication method for web applications due to its scalability and ease…4 min read·Feb 13, 2023--1--1