Blogs

Models in Artificial Intelligence
Models in Artificial …

Model is a simplified version of a real world entity that focuses on some of the properties of the real object that are under study. Similar to the models doing a ramp walk, help us understand how the clothes developed by a designer might look, models are an integral part of software industry, that …

Retrieval Augmented Generation
Retrieval Augmented …

Introduction to RAG Retrieval-Augmented Generation (RAG) is a cutting-edge technique in artificial intelligence that merges generative AI capabilities with large language models to enhance language generation tasks. By integrating both parametric memory (learned patterns) and non-parametric memory …

Sequence Diagrams using Mermaid
Sequence Diagrams using …

I have been creating designs for software solutions for quite some time now. A picture is worth a thousand words and hence the different diagrams really help in expressing the software designs in a better way to fellow team mates. A Sequence diagram is a powerful tool that shows the step-by-step …

Data Reconciliation Patterns in an Event driven AWS Ecosystem
Data Reconciliation …

I recently attended an XKE (Xebia’s Knowledge Exchange) session delivered by Mr. Chandan Kumar and Mr. Himanshu Jain. In this session they talked about the Data Reconciliation Patterns in an Event driven AWS Ecosystem, and I am presenting here my learnings from the session. Data reconciliation …

Approaches to Software Architecture
Approaches to Software …

The architecture of a building plays a critical role in its usability and longevity. Similarly, the architecture of a software application is vital for ensuring scalability, maintainability, and overall system success. In this blog, we will delve into different architectural approaches that can be …

Configuration Management Microservice
Configuration Management …

Configuration management is a crucial yet often overlooked aspect of working with microservices. In a microservices environment, managing various configurations, including those related to client applications, business processes, and technical settings, can become complex. This complexity is further …

Application Security Verification Standard
Application Security …

Application Security Verification Standards Ensuring the security of an application is a complex task. To simplify this process, OWASP (Open Web Application Security Project) has developed a standardized approach1 aimed at gauging and enhancing application security. Application Security Verification …

Adaptive Authentication
Adaptive Authentication

Motivation behind this blog During a visit to my friend’s house, I needed to check my email on his laptop. Upon entering my credentials, I encountered a captcha prompt unexpectedly. After successfully navigating through the captcha challenge, I was then required to enter an additional layer of …

Broken Access Control
Broken Access Control

Access Control in OWASP top 10 Access control is a crucial aspect of application security that ensures users can only perform actions within their authorized permissions. However, broken access control vulnerabilities can lead to unauthorized access, data breaches, and other security risks. In this …