encryption1

5 Encryption Errors Developers Keep Making

If there is one technology that can alleviate the impact of security breaches, it’s encryption — but you have to do it right Encryption should be at the heart of every product or service that stores any kind of customer data. Several other security measures are necessary too, but when they …

StringConcat

String Vs StringBuilder

Most of the people use string everywhere in their code. Actually when doing string concatenation, do you know what exactly you are doing? It has a big drawback mainly in concatenation which can be overcome by StringBuilder. It will give a vast improvement in performance when you use concatenation of …

server-side

Pattern: Server-side service discovery

Context Services typically need to call one another. In a monolithic application, services invoke one another through language-level method or procedure calls. In a traditional distributed system deployment, services run at fixed, well known locations (hosts and ports) and so can easily call one another using HTTP/REST or some RPC …

serverclient

Pattern: Client-side service discovery

Context Services typically need to call one another. In a monolithic application, services invoke one another through language-level method or procedure calls. In a traditional distributed system deployment, services run at fixed, well known locations (hosts and ports) and so can easily call one another using HTTP/REST or some RPC …

EnterpriseAPIMgt_2tier-498x600

Pattern: API Gateway

Context Let’s imagine you building an online store that uses the Microservices pattern and that you are implementing the product details page. …

decentralised-data

Pattern: Microservices Architecture

Context You are developing a server-side enterprise application. It must support a variety of different clients including desktop browsers, mobile browsers and …

single-tier

Pattern: Monolithic Architecture

Context You are developing a server-side enterprise application. It must support a variety of different clients including desktop browsers, mobile browsers and …

A Brief History of C++

A Brief History of C++

Nowadays computers are able to perform many different tasks, from simple mathematical operations to sophisticated animated simulations. But the computer does not …

MitM

Man-in-the-Middle (MitM)

Intercepting and Redirecting Genuine Web Sites Traffic Man-it-the-Middle attack uses proxy servers, DNS poisoning and local Hosts file tampering to intercept and redirect …

bigdata-larger-pane_0

Big Data Analytics

Big data analytics refers to the process of collecting, organizing and analyzing large sets of data (“big data”) to discover patterns and …