How and where do you store your secrets? Well, I am not talking about your personal secrets 🙂 , but here secrets mean your application credentials such as database passwords, account information or any other unencrypted data that you want to store securely. Problem : Credentials should be kept in an encrypted and secure manner … Continue reading Managing credentials with AWS KMS
Smart speakers such as echo or google home, have enabled us to do wonderful things with speech. Instead of just plain commands, they can also start a smooth conversation with you and do tasks for you, such as ordering food, making payments, reading news, listening to music, reading books, telling jokes, entertain your kids and a lot more stuff.
In general it is a very simple pattern. You just wrap your function/method/behaviour with another function which keeps track of the failures/success of the that function (service/DB calls) and opens or closes the circuit for you. Sounds simple enough. It is simple.
Hello! Welcome to the part-2 of "How search engine works" series. Previous part was all about the basic concepts that go behind a search engine at a low level. If you want to refer the previous part, feel free and read it here. This part will be focussed on how things work in elastic search … Continue reading How search engine works ? Elastic search – (Part-2)
Most software today is very much like an Egyptian pyramid with millions of bricks piled on top of each other, with no structural integrity, but just done by brute force and thousands of slaves. - Alan Kay Writing code is simple. Yes, you read it right. It is simple, but writing code as readable as … Continue reading Readable Code : Just like a fairy tale