November 10, 2024

Post Image

Explained - IPSec VPN Tunnels

IPSec VPN Tunnels A deep-dive for engineers who need to reason about IPSec at a design level; not just configure it. There's a reason IPSec has survived decades of evolving network architecture; it's not elegant, but it's thorough. Understanding it properly means getting past the surface-level "it encrypts your traffic" explanation and into how the protocol suite actually negotiates, wraps, and protects packets at every hop. W… Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Data Mesh

Explore the concept of Data Mesh in this white paper, a decentralized approach to data architecture. Learn how it empowers domain teams, ensures scalability, and improves data ownership and quality, revolutionizing traditional data management practices. Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Message Queuing Telemetry Transport (MQTT)

Ever wondered how your smart thermostat "talks" to your phone, or how a sensor on an oil pipeline sends data thousands of miles away? Chances are, MQTT is behind it. What is MQTT? MQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed to send small packets of data between devices — even over slow, unreliable, or low-bandwidth networks. Think of it as a postal system optimised for postcards, not packages. … Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Distributed Storage Systems

The blog post explores distributed storage systems, discussing their architecture, benefits, and key technologies like consistency models and replication. It covers use cases, scalability, fault tolerance, and the evolution of storage solutions for modern applications. Read More
by Phee Jay

December 09, 2022

Post Image

Okta - PKCE Verification Failed while requesting token

Understand and resolve the "PKCE verification failed" error when integrating with Okta. This guide explains common causes, such as mismatched code verifiers, and provides troubleshooting steps to ensure secure and successful OAuth 2.0 authentication flows. Read More
by Phee Jay

December 08, 2022

Post Image

AWS - How to rename an AWS Lambda function?

The blog post provides a step-by-step guide on how to rename an AWS Lambda function, including considerations for preserving configurations, updating dependencies, and ensuring proper function invocation. Read More
by Phee Jay

February 11, 2019

Post Image

Groovy - What is Memoization?

Learn about memoization in Groovy, a powerful technique to optimize performance by caching function results. Understand how it works, its benefits, and how to implement memoization effectively to reduce redundant computations in your applications. Read More
by Phee Jay
×