Harsh MighlaniDemystifying Event-Driven Architecture and Interaction models:Event-Driven Architecture is an architectural pattern where the flow of the application is determined by events, such as user actions…Jan 18Jan 18
Harsh MighlaniAWS and GCP Comparisons: ComputeInstance template in gcp v/s AWSOct 14, 2023Oct 14, 2023
Harsh MighlaniAWS and GCP Comparisons: NetworkGateway endpoint in AWS v/s GCPOct 14, 2023Oct 14, 2023
Harsh MighlaniWhat is PSD2 & Role of SCA?PSD2 is the European Union’s landmark regulatory framework for the payment services industry, introduced to replace the original Payment…Sep 30, 2023Sep 30, 2023
Harsh MighlaniUnderstanding Reentrant Locks in Java: Ensuring Thread SafetyConcurrency is an essential aspect of modern software development. In Java, managing multiple threads concurrently can be challenging, as…Sep 27, 2023Sep 27, 2023
Harsh MighlaniHow Java’s Constant String Pool has a Security implicationThe constant string pool in Java, often referred to as the “String Pool,” doesn’t directly provide security features in the sense of access…Sep 13, 2023Sep 13, 2023
Harsh MighlaniUnderstanding Hexagonal ArchitectureIn the world of software architecture, creating systems that are maintainable, scalable, and adaptable is paramount. One approach that has…Aug 20, 2023Aug 20, 2023
Harsh MighlaniSecuring REST API’s:Securing a REST API involves implementing various security measures to protect the API against unauthorized access, malicious attacks, and…Mar 14, 2023Mar 14, 2023
Harsh MighlaniBlockchain EssentialsBlockchain technology is one of the most significant technological innovations of the 21st century. It has the potential to revolutionize…Mar 13, 2023Mar 13, 2023
Harsh MighlaniOauth2: Buzzwords ExplainedOAuth2 (Open Authorization 2.0) is an authorization framework that allows third-party applications to access user resources without…Mar 13, 2023Mar 13, 2023