Data mesh is an architectural paradigm about how you think and organize data and its services, similar to microservices which is an architectural pattern for designing and building applications.Microservices based architecture helps to solve the challenges which prevents an organization to be agile and respond quickly to changes like delay in introducing new features, long … Continue reading What is a Data Mesh ??
A/B Testing In simple terms A/B testing is a way to compare two versions of something to determine which performs better .In an A/B test, some percentage of your users automatically receives “version A” and other receives “version B.It is a controlled experiment process. To run the experiment user groups are split into 2 groups. … Continue reading A/B Testing vs Canary Release vs Blue Green Deployment
Data warehouse Aggregation of data collected from multiple sources to a single central repository that unifies the data quality and format.Highly curated data that serves as the central version of the truthMeant to store structured data.Mostly used for BI, Analytics, Data mining, Artificial Intelligence(AI) and machine learningExample of use cases - Big data integration, NLP, … Continue reading Data warehouse vs Data Mart Vs Data Lake
The Client Credentials grant type is used by applications/services to obtain an access token outside of the context of a user.It is used when applications request an access token to access their own resources, not on behalf of a user. Example you have 2 APIs one for maintaining the users and one for sending notifications … Continue reading Client Credentials Grant Type in OAuth
In an Implicit Grant Type, client requests access token directly, without the need for an Authorization Code which was a step in Authorization Code flow Therefore the word "implicit" comes from the implicit authorization which we get from the from the /authorize endpoint, instead of exchanging auth code for token from /token endpointThe Implicit grant … Continue reading Implicit Grant Type in OAuth
Thank you !!!!!!!!
Authorization Code Flow, aka 3 Legged returns an Authorization Code to the Client, which can then be exchanged for an ID Token and an Access Token directly.Once the user authorizes the request to access protected resource , the request is redirected back to a registered endpoint to get the Authorization Code.Authorization code is then exchanged … Continue reading Authorization Code Flow in OAuth
In the last What is OAuth blog , i shared an example of greet.com app accessing contact details for the user from another app and how the OAuth process works at high level. In this blog, i will share some key terminologies of OAuth by referring to the example shared in last blog. Resource/Protected Resource: … Continue reading Key Terminologies in OAuth
OAuth is an open standard for authorization. OAuth 2.0 is the latest and most widely used form of OAuthIt allows people to authorize applications to access another application on their behalfLet us understand this more by an exampleImagine you subscribed to an application greet.com in which you can make custom greetings/posters.Now once you build a … Continue reading What is OAuth???
Dockerfile is a text file that contains the instructions needed to create a new container image. Docker engine reads the instructions from top to bottom. It contains a bunch of instructions which informs Docker HOW the Docker image should get built. It is like the script of a movie which contains details on how the … Continue reading DockerFile , Docker Image, Docker Container