Architecture, Digital Security, Machine Learning, Big Data
Soon to be published. The book provides a comprehensive understanding of Event-Driven Architecture (EDA) and facilitates the practical application of this knowledge in the development of high-performance, scalable, and resilient systems using Python and Apache Kafka.
The book offers a comprehensive journey into the realm of enhanced security in web apps. Beginning with web authentication basics, it builds a strong foundation. It explores cryptography fundamentals, essential for secure authentication. The book also delves into the connection between authentication and network security, mastering federated authentication via OAuth and OIDC protocols.
When integrating federated identity providers with Keycloak, ensuring a smooth user authentication experience is crucial. One common issue that can disrupt this experience is improper error handling, leading to users being redirected to a default page instead of completing the federated authentication process. This blog post delves into this specific Keycloak error handling mechanism and explores potential solutions.
This blog details out how data pipeline can be leveraged to ingest data and do analytics using AWS analytics stack in retail industry, particularly consumers domain. It also describes how various analytics report, a.k.a. "vanity metrics" reports, and ML can be harnessed to prop up growth.
How you can easily build an automated cross-region/cross-account data pipeline using AWS Data Pipeline and AWS lambda.
This blog post explains how Keras library is used to classify email texts as spam or ham.
This post mentions the issue with unpickling in case of multi-module python project set up, and the way to resolve it.
Is big data just a fad? Considering all of its use cases and its integration into IoT, science and machine learning, it might be more than just a buzzword.
How AWS DynamoDB NoSQL database can be set up locally in development environment and how it can prop up and expedite development process.
Performance tuning can be a complex and time consuming process with good chance of you getting frustrated if you do not have abundant patience, especially for products/applications that have high demand on performance but have poor foundation with respect to it. It is an ongoing process – often long and frustrating, that works in an iterative mode and needs to be treated and managed differently from normal development process. One should take a note that this is not about a silver bullet but concerted, honest and persevered effort. If something does not go well, it can be horribly wrong with the potential of rendering the application worse performing than it was initially. This article tells about first-hand real-time experience with tuning including suggestions and guidelines on how one should approach it in order to successfully achieve it.
May 30, 2025
Sept. 2, 2020
Sept. 1, 2018
March 30, 2017
Jan. 18, 2017