Blogs

Sequence Diagrams using Mermaid
Sequence Diagrams using …

I have been creating designs for software solutions for quite some time now. A picture is worth a thousand words and hence the different diagrams really help in expressing the software designs in a better way to fellow team mates. A Sequence diagram is a powerful tool that shows the step-by-step …

Data Reconciliation Patterns in an Event driven AWS Ecosystem
Data Reconciliation …

I recently attended an XKE (Xebia’s Knowledge Exchange) session delivered by Mr. Chandan Kumar and Mr. Himanshu Jain. In this session they talked about the Data Reconciliation Patterns in an Event driven AWS Ecosystem, and I am presenting here my learnings from the session. Data reconciliation …

Approaches to Software Architecture
Approaches to Software …

The architecture of a building plays a critical role in its usability and longevity. Similarly, the architecture of a software application is vital for ensuring scalability, maintainability, and overall system success. In this blog, we will delve into different architectural approaches that can be …

Configuration Management Microservice
Configuration Management …

Configuration management is a crucial yet often overlooked aspect of working with microservices. In a microservices environment, managing various configurations, including those related to client applications, business processes, and technical settings, can become complex. This complexity is further …

Application Security Verification Standard
Application Security …

Application Security Verification Standards Ensuring the security of an application is a complex task. To simplify this process, OWASP (Open Web Application Security Project) has developed a standardized approach1 aimed at gauging and enhancing application security. Application Security Verification …

Adaptive Authentication
Adaptive Authentication

Motivation behind this blog During a visit to my friend’s house, I needed to check my email on his laptop. Upon entering my credentials, I encountered a captcha prompt unexpectedly. After successfully navigating through the captcha challenge, I was then required to enter an additional layer of …

Broken Access Control
Broken Access Control

Access Control in OWASP top 10 Access control is a crucial aspect of application security that ensures users can only perform actions within their authorized permissions. However, broken access control vulnerabilities can lead to unauthorized access, data breaches, and other security risks. In this …

Sim Binding
Sim Binding

Sim Binding Sim binding is a process requirement by RBI to provide secure mobile applications. The RBI has issued the Master Direction on Digital Payment Security Controls to ensure the security of digital payment systems. The directions apply to scheduled commercial banks, small finance banks, …

Dev Experience
Dev Experience

I recently came across this article on the GitHub blog that discusses how GitHub’s Developer Experience (DX) team improved innerloop development. While reading the article I was reminded of this quote Clients do not come first. Employees come first. If you take care of your employees, they …