The 10 Generations(Ages/ Stages) of Artificial Intelligence.I have brought the third article of my Artificial Intelligence Article Series today with an explanation about the Generations of Artificial…Jun 15Jun 15
The 10 Generations(Ages/ Stages) of Artificial Intelligence. (Article #01)I have brought the second article of my Artificial Intelligence Article Series today with an explanation about the Generations of…Jun 9Jun 9
Let’s Dive Just on Artificial Intelligence. (AI)What I hope to talk about in this article is a basic introduction to Artificial Intelligence (AI) and what is an AI?, the history of AI…Jun 2Jun 2
Why HTTP based Microservices is a BAD idea.why http based Microservices is bad?Jul 22, 2022Jul 22, 2022
Real Async Microservices | SAGA Microservice Pattern.Due to its synchronous nature, the HTTP protocol is inappropriate for microservices backends, instead, asynchronous communication is needed…Jul 22, 20222Jul 22, 20222
How to Secure Enterprise Microservice architecture with SSO | Keycloak with Open Policy Agent.How to secure enterprise micro service architecture with SSO?, Every system we design needs to have security implemented. Do you know how…Jul 21, 2022Jul 21, 2022
oAuth and OpenID connect.OAuth2, a secure and open protocol for data sharing, should be included in every app. Access to the data is made possible by this…Jul 21, 2022Jul 21, 2022
Design Patterns for Microservices.For the creation of contemporary applications, the microservices architecture has emerged as the best option. Microservices are renowned…Jul 15, 2022Jul 15, 2022
Protect your Services with Circuit Breaker Pattern.Circuit Breaker Pattern.Jul 15, 20221Jul 15, 20221
Best practices for Microservices / Web Application Developers.The best practices for microservices architecture that we must adhere to in our project will be covered in this post. Understanding these…Jul 14, 2022Jul 14, 2022