Handling Large Responses In API

In today’s world there are many API testing clients like postman, restlet etc. in which we can manually verify the response as per its corresponding request. But as we all know each software has its own limitation, and in this article, I will let you know a few of them which I faced and the Read more…

SHARE THIS

Brute Force Attack

Brute force attack work like as a thought. Suppose if locks not open by single key then we try other different keys. Brute force attack also work on same concept. Brute force attacks are performed with a software which software create thousand’s combination of username passwords of number, alphabets, symbols, or according to parameters of Read more…

SHARE THIS

Kubernetes Elasticity

What is Kubernetes Elasticity? Horizontal Pod scaling UP/Down as well as Nodes scaling UP/Down when pods are requiring nodes at the time when user suddenly increase/decrease accessing your website.  So, nodes of kubernetes dynamically scaling up/down automatically is known as Kubernetes Elasticity. How It happens? It watches the pods continuously and if it finds that Read more…

SHARE THIS

Need of Automating Cloud infrastructure using HashiCorp

What is automation cloud infrastructure? A auto provisioning instance with their Operating System, hardware resource, region , creating of storage, auto creating for code pipeline, route 53 domain, Load balancer, auto-scalar, auto creation of kubernetes environment, auto creation of database instance etc is know as  automation cloud infrastructure By automating the provisioning, configuration, and management Read more…

SHARE THIS

Continuous Deployment with Microservices using Kubernetes and Jenkins

What is a Microservices?Before understanding Microservices, let’s discuss about Monolithic. In a monolithic architecture, all code is in one principal executable file which can be tougher to troubleshoot, test and update. Hence, we can deploy the code base of our system in a project and any updates in the system will be applied using a continuous integration (CI) Read more…

SHARE THIS

5 Open Source Security Risks

The biggest challenges facing the software industry today is the various open source vulnerabilities. Open source contributes almost 75% of the code in the products today, which opens up various security-related challenges that need to be addressed by the development community. However, in the recent years, there has been a lot of awareness programs by Read more…

SHARE THIS

Impact of IoT on Data Science

Imagine you wake up by the aroma of freshly brewed coffee, the light entering your room, and by a gentle massage by your hi-tech bed, rather than a traditional alarm. This is because you are being monitored by the sensor present in the bed. Moving on, you might have a little time left before going Read more…

SHARE THIS