Blogs

Broken Access Control
Broken Access Control

Access Control in OWASP top 10 Access control is a crucial aspect of application security that ensures users can only perform actions within their authorized permissions. However, broken access control vulnerabilities can lead to unauthorized access, data breaches, and other security risks. In this …

Sim Binding
Sim Binding

Sim Binding Sim binding is a process requirement by RBI to provide secure mobile applications. The RBI has issued the Master Direction on Digital Payment Security Controls to ensure the security of digital payment systems. The directions apply to scheduled commercial banks, small finance banks, …

Dev Experience
Dev Experience

I recently came across this article on the GitHub blog that discusses how GitHub’s Developer Experience (DX) team improved innerloop development. While reading the article I was reminded of this quote Clients do not come first. Employees come first. If you take care of your employees, they …

Multi Tenant Architecture
Multi Tenant Architecture

Working for a bank, we developed a highly successful platform for their retail users. It boasted modern features, robust security practices, and an exceptional user experience. However, we faced a new challenge when the bank requested us to extend the same platform for their High Net Worth …

Kareena Kapoor Controllers and the Fluffy Services
Kareena Kapoor …

A microservice is a small, independent application that is designed to perform a specific business functionality. It is a software architectural style that structures an application as a collection of loosely coupled services, each running in its own process and communicating with each other through …

Cost of developing a software
Cost of developing a …

Trigger for this blog I was pair programming during an interview, where the candidate had shared his screen and I was working side by side with him, trying to understand the solution he was presenting. Picture this: his computer screen flashed a message about his Windows license being expired. I …

Gamification - Make it interesting
Gamification - Make it …

Learning by Gamification If you have ever taught a child who is just starting school, you may have noticed that concepts that seem simple to you can be quite complex for them. This is due to their limited understanding and lack of prior knowledge. Additionally, children often have short attention …

GIFT City- India's Gateway to Global Business Excellence
GIFT City- India's …

Situated between Ahmedabad and Gandhinagar, along the Sabarmati river, GIFT City (Gujarat International Finance Tec-City) emerges as India’s beacon of global business excellence. The city’s futuristic infrastructure, coupled with its strategic location, sets the stage for a …

Understanding the logging architecture
Understanding the logging …

In any software development project, logging plays a vital role in understanding and troubleshooting the behavior of applications. Imagine you are working on a web application that consists of multiple components, such as a frontend server, backend server, and a database. Each of these components …