Creating a JWT auth server in 1 second

Security is one of those things you shouldn’t play around with yourself, unless you know what you’re doing. This is the reason products such as Identity Server has gained such momentum and popularity. However, Identity Server is extremely difficult to configure correctly, and OIDC is also arguably a "hack" on top of OAuth2. JWT on the other hand, is dead simple to understand, and was created explicitly to authenticate and authorise users, contrary to OAuth that was originally created for an entirely different purpose. Hence, JWT is just as secure as OpenID Connect, only a gazillion times easier to understand and implement.

In the following video I demonstrate how to create your own JWT server using Magic in 1 second. Notice, Magic is a commercial product, and you need to pay a small fee to use it in a production environment – But compared to the number of hours you’d have to spend rolling your own Enterprise Single Sign On solution using JWT, I’m confident in that the license costs are small in comparison.

Source de l’article sur DZONE

Using React Native, Ionic, and JHipster for Mobile Development

There are many options when it comes to developing mobile apps; there’s Kotlin or Java for Android and Swift and Objective C for iOS. Additionally, you have Progressive Web Apps (that have the ability to work offline and look like mobile apps) and hybrid mobile apps (apps created with web technologies that look like native apps).

I’m a web developer, and I like to use the technologies I know to create apps. This screencast shows you how to use JHipster—along with its Ionic and React Native modules—to create a health tracking application.

Source de l’article sur DZONE

Align Engineering Metrics to Business KPIs


What’s your cycle time? If you can’t answer it, don’t worry, you’re not alone. Many engineering leaders couldn’t tell you without some significant number-crunching. Gaining visibility into performance is only half the battle though. Knowing how to interpret metrics and how to apply them to improving performance is where the magic happens. Many CEOs do not know how to align engineering metrics to business KPIs (revenue, customer retention, etc.). Bringing metrics to your board or non-technical CEO for the first time may be challenging if you are unable to help them bridge the gap.

Learn which metrics matter for engineering leaders.

Source de l’article sur DZONE

A Simulation Using Sequential and Parallel Collections in Scala 2.13


Introduction

Software to be build is to compare data from independent satellite systems.  As fighter jets traverse airspace, each system determines its identity, recording the name of the jet type or an equivalent letter or number abbreviation. For data collected over time, the simulation software must ascertain whether systems agree on identification and if so, whether contrasting the data by single or multiple processors would be more efficient.

This article begins with a proof of concept in Scala 2.12.   A small program with function taking generic collection type parameters verifies the basic strategy.  The actual software is written in 2.13, in which generic collection types – those inheriting the GenTraversable hierarchy – have been deprecated [1].  The parallel package is also gone but can be brought back [2].

Source de l’article sur DZONE

7 Key Node.js Advantages to Develop Scalable Web Apps

Over the years, Node.js has become the go-to technology for building scalable web applications. It has gained enormous popularity amongst developers due to the many significant benefits it offers. With the support of an enthusiastic community, node.js is standing firm with a 51.9% stake as the most popular web framework, according to Stack Overflow’s 2020 Developer Survey

Looking at the rising trend, we are debunking some of the top advantages which make Node.js a popular development choice in 2020.

Source de l’article sur DZONE

An Ultimate Guide to the Scrum Project Management

If you’ve spent even a small amount of time in the field of digital project management then you must have heard about the Scrum methodology. Scrum, which was initially designed for software development teams now, finds its application across many other fields like marketing, project management, and many more.

working on laptop animation

According to a report by a Project Management Institute, more than half of the project managers who use the Agile framework uses the Scrum methodology. Not only this, but a PMI survey also shows that around a combined total of 55% of organizations "Sometimes", often", or "always" uses Scrum.

Source de l’article sur DZONE

Kubernetes Authentication

There are three steps that Kubernetes uses to enforce security access and permissions — Authentication, Authorization and Admission. In this article we are going to consider Authentication first.

              The Authentication, Authorization and Admission Control Process

The first thing in Authentication is Identity.

Source de l’article sur DZONE

Istio 1.6 Improves Operability and Enhances Simplicity

Significant changes were made to the Istio service mesh in its version 1.5 release earlier this year, including notable modifications to the control plane architecture and the creation of a single model for extending Istio and its Envoy proxies using WebAssembly. Istio’s latest quarterly release, version 1.6, at first glance may seem to carry less weight in comparison, however, this update includes several important enhancements that continue to improve its operability.

Installation and Configuration Management

Reducing Upgrade Risks

Istio 1.6 introduces canary support for upgrading versions of the Istio control plane, enabling users to deploy numerous releases of Istiod within the same cluster and migrate pods to a newer version. This will significantly reduce any risks that arise when carrying out upgrades in a production cluster. When installing new control plane versions, the istioctl the command-line tool now supports assigning names to versions that can be utilized when assigning workloads to each specific Istiod version running in the service mesh.

Source de l’article sur DZONE

K-Means and SOM: Introduction to Popular Clustering Algorithms

K-means and Kohonen SOM are two of the most widely applied data clustering algorithms.  

Although K-means is a simple vector quantization method and Kohonen SOM is a neural network model, they’re remarkably similar. 

Source de l’article sur DZONE

Low-code Limits Customization Flexibility: Myth or Reality?

It’s not controversial to say that low-code has become a trend in the development of turnkey solutions for business. However, low-code is not traditionally the first choice for developing systems that handle complex business tasks. One of the main drawbacks associated with low-code development is the limited functionality of applications created. Often platforms do not provide an easy way to add custom code.

In this article, we will discuss if a low-code platform could be flexible enough to describe the logic of really sophisticated business processes.

Source de l’article sur DZONE