When you are creating apps using an IDE like Eclipse or IntelliJ IDEA, compiling and running your code is pretty easy since the IDE will take care of many of the things behind the scenes. But you may encounter this
Here is a single line that will enlighten your world 🙂 “OpenID is a protocol for authentication while OAuth is for authorization” In OpenID, authentication is delegated: Server A wants to authenticate user U, but U’s credentials (e.g. U’s
In this post I would like to share with you some enlightening quotes from spring documentation. Here you will see the difference between some of the spring annotations like @component, @service, @repository, @controller, what it means to use them or can
In this post, I will try to guide you on how to develop with Spring’s wrapping of Netflix’s Eureka. Eureka is a REST (Representational State Transfer) based service that is primarily used in the AWS cloud for locating services for the purpose of
Indexing, Retrieving, Deleting Documents in Elastic Search (Using Kibana) Elasticsearch (ELK Stack) – Part 1 I have been playing around with ELK (Elasticsearch, Logstash, Kibana – Elastic Stack) and I though I would paste some of my notes here. The
I wanted to try creating a CI (continuous integration) pipeline using Jenkins at home for fun 🙂 I launched IntelliJ IDEA by jetbrains and created an empty test project. Then I added this project to Git. In case you don’t know
Have you tried Asana? We did and we liked it… When you are just starting a new project you may not always have all the tools at your disposal. Sometimes it takes time to acquire them tools. Tools like JIRA.
What is a URI? URI (Uniform Resource Identifier) is a series of characters to identify a resource. It has the following format: scheme:[//[user[:password]@]host[:port]][/path][?query][#fragment] Here the “scheme” is mistaken for protocols. Schemes are not protocols. Many schemes have been designed to
I see that many people are confused by the meaning of authentication and authorisation. People use the two interchangeably. They tend to use both authentication and authorisation for the same thing. But actually there is a difference between the two.
I am a software engineer and I frequently develop software individually (other than my regular job) in my spare times. Recently, I decided to develop a program with rather large scope compared to my previous freelance works. Until this time, when