Igor Venturelli

    • About
    • Contact
    • Contato
    • Cookies Policy
    • Home
    • Mentorship
    • Privacy Policy
    • Sobre Mim
    • Terms of Use
Illustration of a bird flying.
  • AWS Local Authentication: Understanding Your Options and Using IAM User Long-Term Credentials Responsibly

    AWS Local Authentication: Understanding Your Options and Using IAM User Long-Term Credentials Responsibly

    When you’re working with AWS as a backend engineer — especially with Java and Spring Boot stacks — there will inevitably come a moment when you need to run commands against your AWS resources using the AWS Command Line Interface (CLI) or AWS SDKs. And that moment comes with a crucial question: “How do I…

    July 6, 2025
  • How to Securely Connect Your Spring Boot App to PostgreSQL with AWS Secrets Manager — No More Hardcoded Credentials

    How to Securely Connect Your Spring Boot App to PostgreSQL with AWS Secrets Manager — No More Hardcoded Credentials

    Hardcoding database credentials is a practice we all want to avoid — yet it still happens. With Spring Boot and AWS Secrets Manager, you can eliminate plain-text secrets in your application.properties while keeping your configuration simple and flexible.

    June 30, 2025
  • How to Connect Spring Boot to PostgreSQL Using Spring Data JPA

    How to Connect Spring Boot to PostgreSQL Using Spring Data JPA

    PostgreSQL is a production-grade relational database system widely used across modern enterprise and microservice architectures. If you’re building a Spring Boot application, connecting it to PostgreSQL isn’t just a matter of adding a dependency—it’s about configuring it the right way from day one. This guide walks you through how to connect a Spring Boot application…

    June 23, 2025
  • Exception Handling Like a Pro in Spring Boot REST APIs

    Exception Handling Like a Pro in Spring Boot REST APIs

    In a perfect world, your REST API always works flawlessly. But in the real world? Things break. How your application handles those failures can define the difference between a developer’s dream and a support team’s nightmare. In this post, you’ll learn how to implement robust, consistent, and professional-grade exception handling in Spring Boot. We’ll go…

    June 16, 2025
  • Building Robust APIs with Spring Boot and Validation Annotations

    Building Robust APIs with Spring Boot and Validation Annotations

    When building APIs, the hardest bugs often come from the easiest oversight: trusting user input. If your controller accepts data as-is and only relies on business logic to catch errors, you’re putting too much responsibility on the wrong layer. Validation isn’t a nice-to-have. It’s a contract.

    June 9, 2025
  • Understanding Dependency Injection in Spring: Field vs Constructor vs Setter

    Understanding Dependency Injection in Spring: Field vs Constructor vs Setter

    Dependency Injection (DI) is at the heart of the Spring Framework. It promotes loose coupling and easier unit testing by decoupling object creation from object usage. In Spring, there are three main ways to inject dependencies into a class: field injection, setter injection, and constructor injection. While all three are supported, each has its own…

    June 2, 2025
  • What Is a DTO? (And Why You Shouldn’t Return Your Entities in Spring Boot)

    What Is a DTO? (And Why You Shouldn’t Return Your Entities in Spring Boot)

    When building REST APIs with Spring Boot, it’s common to see beginners return entities directly from their controllers. At first glance, this seems fine—the data flows, the response looks right, and everything “just works.” But what happens when your entity evolves? When sensitive fields accidentally get exposed? Or when lazy-loaded relationships break your JSON?

    May 19, 2025
  • Getting Started with Spring Boot: Build a Task Manager App from Scratch

    Getting Started with Spring Boot: Build a Task Manager App from Scratch

    Spring Boot is the industry-standard framework for building modern Java applications. It dramatically reduces boilerplate code, accelerates development, and is battle-tested for microservices and monoliths alike. If you’re new to the Spring ecosystem, this post will walk you through everything you need to start building.

    May 5, 2025
  • Spring Boot Profiles: Managing Multiple Environments Like a Pro

    Spring Boot Profiles: Managing Multiple Environments Like a Pro

    Learn how to manage multiple environments in Spring Boot using profiles, properties, and YAML configurations

    March 19, 2025
  • Protecting Your Spring Boot Application with OAuth2 Resource Server and Auth0

    Protecting Your Spring Boot Application with OAuth2 Resource Server and Auth0

    Secure your Spring Boot API with OAuth2 Resource Server and Auth0, using JWT authentication for protection

    March 12, 2025
1 2 3 … 11
Next Page→

Igor Venturelli

Proudly powered by WordPress

Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}