Rakesh RathiSecuring Access: The Power of RBAC, ABAC, and ReBACRBAC, ABAC, and ReBAC are frequently mentioned by teams when discussing authorization and permission systems. While most developers have…Jun 10Jun 10
Rakesh RathiUnderstanding Extensible Messaging and Presence Protocol (XMPP)1. Introduction to XMPPOct 23, 2023Oct 23, 2023
Rakesh RathiChoosing Between KVM and QEMU Hypervisors for Cloud ComputingIn the world of cloud computing, hypervisors are like essential tools. They help turn one powerful computer into many smaller ones, so it…Oct 15, 2023Oct 15, 2023
Rakesh RathiClickHouse Capabilities: A Quick OverviewClickHouse is a fast, open-source columnar database management system designed to enable analytical processing. Unlike many databases…Oct 5, 2023Oct 5, 2023
Rakesh RathiVideo Streaming Protocols and Workflow: Lights, Camera, Streaming!In the world of video streaming, various protocols play a crucial role in efficiently delivering content to viewers. This post will focus…Sep 30, 2023Sep 30, 2023
Rakesh RathiTime-Based One-Time Password (TOTP) — Java ImplementationThe Time-Based One-Time Password (TOTP) algorithm is frequently utilized to generate unique codes, primarily for two-factor authentication…Sep 30, 2023Sep 30, 2023
Rakesh RathiEmbracing Domain-Driven Design: A Deep Dive into Core ConceptsDomain-Driven Design (DDD) is a software development approach that focuses on modeling the core concepts of the system using the domain…Sep 30, 2023Sep 30, 2023