Blogs
Retrieval Augmented …
Introduction to RAG Retrieval-Augmented Generation (RAG) is a cutting-edge technique in artificial intelligence that merges generative AI capabilities with large language models to enhance language generation tasks. By integrating both parametric memory (learned patterns) and non-parametric memory …
Sequence Diagrams using …
I have been creating designs for software solutions for quite some time now. A picture is worth a thousand words and hence the different diagrams really help in expressing the software designs in a better way to fellow team mates. A Sequence diagram is a powerful tool that shows the step-by-step …
Data Reconciliation …
I recently attended an XKE (Xebia’s Knowledge Exchange) session delivered by Mr. Chandan Kumar and Mr. Himanshu Jain. In this session they talked about the Data Reconciliation Patterns in an Event driven AWS Ecosystem, and I am presenting here my learnings from the session. Data reconciliation …
Approaches to Software …
The architecture of a building plays a critical role in its usability and longevity. Similarly, the architecture of a software application is vital for ensuring scalability, maintainability, and overall system success. In this blog, we will delve into different architectural approaches that can be …
Configuration Management …
Configuration management is a crucial yet often overlooked aspect of working with microservices. In a microservices environment, managing various configurations, including those related to client applications, business processes, and technical settings, can become complex. This complexity is further …
Application Security …
Application Security Verification Standards Ensuring the security of an application is a complex task. To simplify this process, OWASP (Open Web Application Security Project) has developed a standardized approach1 aimed at gauging and enhancing application security. Application Security Verification …
Adaptive Authentication
Motivation behind this blog During a visit to my friend’s house, I needed to check my email on his laptop. Upon entering my credentials, I encountered a captcha prompt unexpectedly. After successfully navigating through the captcha challenge, I was then required to enter an additional layer of …
Broken Access Control
Access Control in OWASP top 10 Access control is a crucial aspect of application security that ensures users can only perform actions within their authorized permissions. However, broken access control vulnerabilities can lead to unauthorized access, data breaches, and other security risks. In this …
Sim Binding
Sim Binding Sim binding is a process requirement by RBI to provide secure mobile applications. The RBI has issued the Master Direction on Digital Payment Security Controls to ensure the security of digital payment systems. The directions apply to scheduled commercial banks, small finance banks, …