Over the past few months, I've been refreshing myself on some of the concepts of Machine Learning and AI, and I've decided to write a few posts on those, which primarily serve as notes to myself (which is why I call my blog "Notebook"), and hopefully this will help someone else as well. This one … Continue reading What is an N-gram Language Model
Author: Rajind Ruparathna
Designing Authentication and Authorization for a Multi-Tenant Application with Keycloak
Keycloak is awesome and I've been a big fan of Keycloak for some time now. In this post, I'll share my thoughts on the decisions I've had to make when designing a multi-tenant application with Keycloak as the IAM server. I must give a heads up on the fact that the latest version of Keycloak … Continue reading Designing Authentication and Authorization for a Multi-Tenant Application with Keycloak
How to use Hibernate Filters coupled with Spring Aspects for Data Isolation
Designing a multi-tenant system is fun as long as you get the data isolation done right. If not it could be painful. 😀 In a previous post, I explained how we utilised Row Level Security to enforce data isolation in one of the multi-tenant solutions that I worked with in the past. While Row Level … Continue reading How to use Hibernate Filters coupled with Spring Aspects for Data Isolation
Multi-Tenant Data Isolation & Row Level Security
Over the past 1 and a half years, I was involved in designing and developing a multi-tenant Treasury Management system. In this article, I will share our approaches to the data isolation aspect of our multi-tenant solution and the learnings from it. Background & problem regarding Data isolation Before going into the problem which I … Continue reading Multi-Tenant Data Isolation & Row Level Security
API Gateway Feature Comparison – TYK | AWS | KONG
This is an API Gateway feature comparison on Tyk, Kong and AWS.
Java Considerations for Containerization
Running your application on virtual machines is now a thing in the past and by now most organizations have either already switched to container-based environments to run their applications or are planning to switch to a containerized environment. This article will attempt to give some insight onto how the Java memory-based aspects should change when one is planning to move their Java application to containers.
How to verify AS2 message (SMIME) signature with OpenSSL
This article will look at what the digital signature in AS2 protocol is, how to verify the signature of an AS2 message and some tips on figuring out the cause for certain signature verification failures.
How to decrypt an AS2 message (SMIME) with OpenSSL
This article looks at what encryption and decryption is in AS2 protocol, how to decrypt an AS2 message and some tips on figuring out the cause for certain decryption failures.
Extracting Private Key from Java KeyStore (JKS)
I've been working with the AS2 Protocol and the AdroitLogic AS2Gateway for quite some time now and hence playing with JKS has been a must. One of the tricks which were required from time to time was extracting the private key and public key (certificate) from Java KeyStores. In this blog post, we'll go through … Continue reading Extracting Private Key from Java KeyStore (JKS)
What makes a Storage Service Truly Serverless?
Can every storage service or database service be called a serverless storage or a serverless database? What makes one storage service being put into the serverless category and others drop out?