Cluster computing
Saturday, June 15, 2019
›
This is an initial draft of the STRIDE model of threat mitigation in authentication performed on Kubernetes clusters. STRIDE stands for S...
Thursday, June 13, 2019
›
There are a few other troubleshooting mechanisms which we can call supportability measures. I’m listing them here. Monitoring and Alerts –...
›
Transparency in user query execution: Streaming queries are a new breed. Most applications like Flink require the query logic to be packag...
Wednesday, June 12, 2019
›
Earlier archives and tar balls of executables from different languages were made available to the user to run an application. However, this...
Tuesday, June 11, 2019
›
An embedded Keycloak application extends the class KeycloakApplication. (Names of classes from the Keycloak source used here are italicized...
Monday, June 10, 2019
›
Address Book: Most address books are proprietary in nature or at least tied to a software stack. Active Directory for instance does not le...
Sunday, June 9, 2019
›
We now review the integration testing of embedded Keycloak. This is facilitated with the help of a Keycloak Spring security adapter. The ad...
‹
›
Home
View web version