PinnedKappa Data ArchitectureKappa data architecture is a software architecture that is the simplification of Lambda architecture. In Kappa architecture, the data flows…Nov 27, 2022Nov 27, 2022
PinnedSecuring Containers using Docker Content TrustTrust is a key issue when exchanging data across networked systems. It is particularly important to assure the integrity and the publisher…Nov 21, 2022Nov 21, 2022
Compliance As a ServiceCompliance, or corporate compliance, refers to the set of procedures and best practices applied to ensure that a company and its members…Aug 5Aug 5
Salesforce DevOps Center is a new tool released by Salesforce in June 2022.Salesforce has used the Source Member sObject Tooling API along with SFDX to build DevOps Center. GA release is planned during 9th…Dec 8, 2022Dec 8, 2022
Significance of mTLS and why you should care about itMutual Transport Layer Security (MLS) is a process that establishes an encrypted TLS connection in which both parties use X.509 digital…Nov 18, 2022Nov 18, 2022
Spring Cloud ContractConsumer-Driven Contracts are an approach to ensure service communication compatibility, in which the Consumer and Provider make an…Nov 16, 2022Nov 16, 2022
Object Store Connector in Mule4https://skolaparthi.com/object-store-connector/Nov 12, 2022Nov 12, 2022
Bitbucket Server Api Python Code ExampleBitbucket is a Git-based source code repository hosting service owned by Atlassian.Nov 11, 2022Nov 11, 2022
Security Vulnerabilities in PythonSecurity Vulnerability refers to the quality or state of being exposed to the possibility of being attacked or harmed. When developing an…Nov 9, 2022Nov 9, 2022
Top API Security VulnerabilitiesAn API is a set of programming codes that enables data transmission between one software product and another. From banks, retail, and…Nov 8, 2022Nov 8, 2022