Articles from the blog (Page 2 of 7)
![Cover picture for a blog post titled 2021 - A year in review](/_astro/2021-a-year-in-review.CZW8Msx6_S8XRA.jpg)
2021 - A year in review
In 2021 I joined fourTheorem, became a Microsoft MVP, spoke at many conferences, learned Rust, contributed to open source and much more. I reflect on my professional achievements over the past year.
![Cover picture for a blog post titled Create resources conditionally with CDK](/_astro/create-resources-conditionally-with-cdk.tztkyQ8U_Z1rcdru.png)
Create resources conditionally with CDK
This post explains how to conditionally create resources in AWS CDK using CfnCondition. It provides a practical example of creating an S3 bucket based on an SSM parameter value. The post covers defining a condition, attaching it to a low-level CDK construct, and importing the conditionally created resource.
![Cover picture for a blog post titled Provision an Ubuntu-based EC2 instance with CDK](/_astro/provision-ubuntu-ec2-with-cdk-luciano-mammino-loige.44QsJyNR_1PKw9R.jpg)
Provision an Ubuntu-based EC2 instance with CDK
This post explains how to use CDK to provision Ubuntu EC2 instances on AWS. It covers finding the right AMI, adding security groups, using init scripts, installing AWS utilities, and more.
![Cover picture for a blog post titled How to send gzipped requests with boto3](/_astro/how-to-send-gzipped-requests-with-boto3-luciano-mammino-loige.aarjZe_2_Zjj57f.jpg)
How to send gzipped requests with boto3
The boto3 Python SDK allows intercepting requests before they are sent to AWS through an event handler system. This article shows how to use it to gzip the payload of PutMetricData requests sent to CloudWatch.
![Cover picture for a blog post titled How to to_string in Rust](/_astro/how-to-to-string-in-rust.aCHANCLX_Z27TCvX.jpg)
How to to_string in Rust
This article explores how to convert values to strings in Rust using traits like Debug, Display and ToString. It explains the difference between user-facing and debug representations.
![Cover picture for a blog post titled Rust shenanigans: return type polymorphism](/_astro/rust-shenanigans-return-type-polymorphism.SracMygu_Z1FXWP2.jpg)
Rust shenanigans: return type polymorphism
This article explores return type polymorphism in Rust through examples like Default::default() and a custom dice rolling library. The technique allows writing generic functions that can return different types based on usage. Useful for extensible APIs.
![Cover picture for a blog post titled Where to go to learn Rust in 2021](/_astro/where-to-go-to-learn-rust-in-2021.c9q-b3jF_2tzEai.jpg)
Where to go to learn Rust in 2021
This article provides a list of free and paid resources to learn Rust in 2021 including books, blogs, videos, newsletters, podcasts, communities, exercises, workshops, and open source projects.
![Cover picture for a blog post titled 2020 - A year in review](/_astro/2020-a-year-in-review.Z5nNepIp_2r9iyq.jpg)
2020 - A year in review
Luciano Mammino reflects on his 2020, including publishing Node.js Design Patterns Third Edition book, giving 13 conference talks, joining Fabfitfun as Principal Engineer, releasing Middy 1.0, launching Linkerflix MVP, and setting goals for improving as a software engineer, cloud architect, and indie maker in 2021.
![Cover picture for a blog post titled Learning Rust through open source and live code reviews](/_astro/learning-rust-through-open-source-and-live-code-reviews.8H1bNRi7_Z1vFny5.jpg)
Learning Rust through open source and live code reviews
This article summarizes the experience of two developers learning Rust by building an open source project and having it reviewed live by a Rust expert. It covers the improvements suggested during the review, including simplifying project structure, adding documentation, handling strings, removing code duplication, improving input validation and testing.
![Cover picture for a blog post titled What's in a JWT (Json Web Token)?](/_astro/whats-in-a-jwt.mx1WJW8Y_Z1IRQVk.png)
What's in a JWT (Json Web Token)?
This article explains what JWTs (JSON Web Tokens) are, looking at their internal structure with header, body, and signature. It illustrates how they enable stateless authentication and authorization in distributed systems.