Token-based authentication, relies on Token for determine whether the request is authorized or not. And JWT is one of token-based authentication.
Introduction I guess the title is explaining enough, right? Raise your hands if you find it difficult to understand :). Missing in action can refer to many things. Vacation, Resignation, Decease, Too Busy, On Business Trip, […]
Whenever you deliver your code, you must deliver it with quality.
Introduction Self organized Development Team is one of the key strength of Scrum Team. The team choose how best to accomplish their work, rather than being directed by others outside the team. In order to have […]
Introduction After couples of Golang articles, I want to bring something different in this article. I want to talk about Java 8 features, which is functional interfaces. This feature comes up in 8th edition due […]
Backlog Grooming Session is very important activity for Scrum Project. This article will describe what when where who and how this session about
The idea to apply circuit breaker pattern is to give protection and control over latency and failure, in order to stop cascading failure in a distributed environment. In addition, it provides a fail fast and rapid recovery for our services.
In a environment where number of instances and network locations changes dynamically, a client needs a discovery mechanism to determine the location of a service instance, in order to send a request to it.
API monitoring is essential because APIs are the only interaction mechanism between your services and outside world.
Introduction Having Certified Scrum Master when your organization is planning to adapt Scrum is one of the best strategy. But hiring new resources will definitely consumes time, effort and cost. Another way to handle that is […]