November 10, 2024
Explained - IPSec VPN Tunnels
Delve into the essentials of IPSec VPN tunnels with this white paper. Understand their architecture, protocols, encryption methods, and use cases for secure communication. Perfect for those seeking a detailed technical overview of VPN implementation and best practices. Read More
by
Phee Jay
October 28, 2024
Explained - Data Mesh
Explore the concept of Data Mesh in this white paper, a decentralized approach to data architecture. Learn how it empowers domain teams, ensures scalability, and improves data ownership and quality, revolutionizing traditional data management practices. Read More
by
Phee Jay
October 28, 2024
Explained - Message Queuing Telemetry Transport (MQTT)
MQTT (Message Queuing Telemetry Transport) Executive Summary Message Queuing Telemetry Transport (MQTT) is a lightweight, low-bandwidth, publish-subscribe messaging protocol designed for communication in constrained environments. Initially developed for remote sensors and control devices on low-bandwidth, high-latency networks, MQTT has become one of the dominant protocols used in Internet of Things (IoT) applications. Its efficiency, … Read More
by
Phee Jay
October 28, 2024
Explained - Distributed Storage Systems
Distributed Storage Systems Introduction As data generation grows exponentially across industries, traditional storage systems struggle to meet the demand for scalability, fault tolerance, and high availability. Distributed storage systems offer a solution to these challenges by spreading data across multiple machines or nodes, ensuring efficient data management and high performance in large-scale environments. This paper explores … Read More
by
Phee Jay
December 09, 2022
Okta - PKCE Verification Failed while requesting token
Understand and resolve the "PKCE verification failed" error when integrating with Okta. This guide explains common causes, such as mismatched code verifiers, and provides troubleshooting steps to ensure secure and successful OAuth 2.0 authentication flows. Let me clear a few concepts before I dive into the resolution for " PKCE Verification Failed " " Authorization Code " flow is an OAuth 2.0 flow , wherein an author… Read More
by
Phee Jay
December 08, 2022
AWS - How to rename an AWS Lambda function?
As of writing this article, there is no support in AWS to rename a Lambda function. However, there is an option to set an alias . And you can create multiple of them. The actual purpose of an alias , though, is to act as a pointer to a specific version of the lambda function. It can also act as a router to route traffic between two versions of the function with weight assignment e.g. to test it as a canary. If alias does not meet your needs, then t… Read More
by
Phee Jay
February 11, 2019
Groovy - What is Memoization?
Learn about memoization in Groovy, a powerful technique to optimize performance by caching function results. Understand how it works, its benefits, and how to implement memoization effectively to reduce redundant computations in your applications. Read More
by
Phee Jay