Digital platforms are the backbone of any modern business. It’s a crucial foundational element that sets the stage for scale and innovation. Depending on the unique needs of your business, we build or modernise digital platforms with improved resilience, high observability and scalability for peak performance.
The Problem: Silence in the Face of Workflow Anomalies In the realm of SQS workflow management, I encountered a perplexing issue with SNS alarms. Previously, I relied on SNS alarms to notify me...
Utkarsh Singh
Initially, I started this post with the protocol I wrote a parser for, but since the post became big and complicated — it was probably worth breaking it down into a smaller piece....
Vikas S Shetty
The purpose of this article is to highlight certain configurations that you might need in case you want to run your own postgresql. There is a slight difference between running it locally and deploying postgres...
Anirudh Ramesh
Authentication and authorization are the digital gatekeepers of a web app, playing pivotal roles in ensuring a secure and controlled user experience. One such tool which can help us do this task for...
Harsh Bhandari
In the last article, I have discussed about bootrsapping keycloak server along with a basic setup of nextjs with next-auth. In this subsequent article, our focus will shift to configuring next-auth to enhance the user experience...
Harsh Bhandari
In the ever-evolving landscape of software development, efficiency in testing and validating workflows is crucial. “Act” is a powerful tool designed to enhance and streamline the testing process within GitHub Actions. This tool...
Soumya.L.R.
Databases like PostgreSQL and MySQL provide various locking mechanisms to control concurrency and to avoid data corruption. We looked at different locks in a previous blog and in that I briefly covered advisory locks. In...
Denny Sam
The Great Barrier Reef, Australia’s iconic ecological site and the world’s largest marine ecosystem is buckling under the effects of climate change and other factors. According to a report published by government scientists,...
Anand Iyengar
In the previous blog, we discussed the importance of securing PII and sensitive data points captured by enterprises as part of their business apps, analyzed different techniques of securing these data points namely, Encryption...
Sahaj Software
In my previous blog, I discussed the business need for a high-performance bidder, the challenges of implementing such a solution, and the technology stack we used (Java and Vert.x). This blog post builds on the...
Kulbhushan Singhal
There are times when you want to return something other than the normal result of a function call. It’s quite often that we see an exception being thrown in these cases. Exceptions have...
Mohnish Chowdhury
Managing the secrets of your applications is an integral part of taking an application to production. After all, they contain the keys to your kingdom. Many Java frameworks provide out-of-the-box integration with Vault;...
Mahesh Aravind
We work with Talon Outdoor in the out-of-home advertising (OOH) industry that utilizes billboards, transit stations, shopping centres and other similar places to deliver brand messages to a wide audience in public places. As part...
Kulbhushan Singhal
Written by Amitb and Vighnesh Pathrikar Have you ever found yourself struggling to refactor your code to adhere to SOLID principles or convert user requirements into code? Did TDD or Test-Driven Development feel slow? Have you...
Vighnesh Pathrikar
A practical guide to implementing sensitive data encryption using Postgres Pgcrypto In the previous blog, we discussed the importance of securing PII and sensitive data points captured by enterprises as part of their business...
Priyadarshan Patil
Today, storing a person’s KYC information, credit card/debit card information, or other similar sensitive details to charge for services availed on a platform is commonplace. This entails storing & dealing with Personally Identifiable...
Priyadarshan Patil
Recently I had a challenging problem to solve, where I need to extend a Data Product that serves clients in a single region to clients in another region. Considering different data Laws in...
Sahaj Software
Written by Karthik Ruthiravelu Are you building your application with a Microservices architecture? Are there too many microservices in your application and wondering how to make the network calls faster between your inter-service...
Sahaj Software
This is a follow up to progressively improving .net MVC with Vuejs to show how it can be done. The screen shot below shows how we can use a mix of razor templates and vuejs...
Mohnish Chowdhury
Out Of Home advertising has seen rapid growth in the UK. In 2019, OOH advertising revenue rose 7.6% from 2018 to £1.3bn. However, OOH, by and large, has operated as an offline channel...
Anay Nayak
ASP.NET MVC was a pragmatic choice back in the day when building websites. It allowed DI , adding in light JS frameworks and bundle them together. The DI allowed for testing most the code with...
Mohnish Chowdhury
Introduction Let’s start by answering the question “What is Kafka?”. Kafka is a Distributed Streaming Platform or a Distributed Commit Log Let’s try to understand those jargons. DistributedKafka works as a cluster of...
Aritra Das
Terraform is a great tool to automate your infrastructure provisioning. One of the aims of the automation is having an ability to reproduce the deployments and reducing the time required to do the...
Prashant Kalkar
AWS Lambda function has a timeout of 900 seconds which sometimes is not enough to finish tasks that take a longer time. In such cases, recursion is a technique that can be applied...
Kulbhushan Singhal
ECS is a service provided by AWS that manages the orchestration and provisioning of Docker containers, ECS allows the application to run in the cloud without having to configure the environment for the...
Praveen Raj