3 Flavors of Authorization in a flowThe second important process in a secure system architecture is authorization, aka AuthZ. In the digital world not just the end users have…Nov 4, 2020Nov 4, 2020
Load Balancing the Load balancerThe stories of high availability and horizontal scaling of services to handle millions of transactions depend on a service — The Load…Sep 10, 2020Sep 10, 2020
Published inThe StartupChoreography Inside KubernetesThere would probably be thousands of articles about K8s till date. You may ask — What would this story be about then ? :) This story would…Aug 26, 2020Aug 26, 2020
Azure Managed Identities- the HowSome of the Microsoft-Azure developers might have used Azure Managed Identities and the rest might not have. Do you know what happens…Aug 19, 2020Aug 19, 2020
Comparing architectural aspects of distributed systems- Part 2This story is in continuation to the previous one in this series. Let us continue comparing a few other architectural aspects of the…Aug 16, 20201Aug 16, 20201
Published inThe StartupComparing architectural aspects of distributed systems- Part 1In my quest to explore the internals (the architectural aspects) of three of the famous distributed systems there are in today’s world, I…Jul 13, 20201Jul 13, 20201