Skip to main content

Architecture

AEM dispatcher security

How Good is your AEM Security? – AEMaaCS and 3rd Party Dependencies

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I cover security issues and mitigations specific to AEM.  In this final post, […]

Person Testing Different Business Processes

Introduction to Event Driven Microservices

What is a Microservice? Many Large-Scale Software Projects Employ the architectural approach known as a Microservice System. Efficiency, dependability, performance, and scalability are to be increased. A single application can be developed using the microservice architectural style as a Collection of Small Services, each of which runs in its own process and Communicate with other […]

Dice with words on the faces, reading "Manage Your Risk"

How good is your AEM Security? – Mitigation Tools

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I will cover security issues and mitigations specific to AEM.  Here I will […]

Two programmers working together with lines of code superimposed over them

How good is your AEM Security? – Denial of Service

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Denial […]

RNSecurity

How good is your AEM security? – Sling Resolution

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Sling […]

Data Warehouse 886x590

Deep Dive into Data Warehouse Concepts..!

What is data warehouse? Data warehouse is a relational database designed for analytical needs. It is the act of organizing and storing data in a way to make its retrieval efficient and insightful. It is also called as the process of transforming data into information. Its functions based on OLAP (Online analytical processing). It is […]

How good is your AEM security? – XSS

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM. XSS and AntiSamy As […]

Istock 1315109884

Understanding Cloud Native and What’s In It for Your Organization

“Cloud Native” is the current buzzword we will hear everywhere in major digital transformation projects currently underway. But what does Cloud Native even mean? Is it worth doing it for your organization? These are questions that pop up when thinking about transforming our workloads in a Cloud Native way. So let us dive in. What […]

Person Testing Different Business Processes

Introduction to CQRS, AXON Framework and AXON Server

Introduction We will learn about the Axon Framework, Axon Server, what CQRS is, how it works, and why it is so Popular worldwide in this blog. AXON is an Open-Source Framework for event-driven microservices and domain-driven design. It is a Java Framework that gives developers access to repositories, implementations of crucial components including aggregates, command, […]

1659337544874

Retrieval of different datatypes with formContext Data Objects on Model driven (Dynamics 365) Forms

This article is dedicated to retrieving different data values available on Dataverse tables using client-side scripts such as JavaScript. This technic would be very helpful to extend model-driven form out-of-box functionality to meet the real-time business requirement, such as implementing complex business rules validations, making form fields hide/show, manipulating datatypes values, and many more. Now […]

A group of diverse coworkers working on the computer together

Optimizely CMS – the Importance of GUIDs and Assembly Names

In the Optimizely CMS world, we see GUIDs everywhere. They are unique identifiers for content types and more. As part of Optimizely CMS development, developers are advised to always specify GUIDs in their Content-Type declarations. If one isn’t specified, the DB assigns one dynamically when saving the Content-type. A big reason for this is that […]

abstract circuit networking blockchain concept background

Azure Application Insights – Cost Save with this Simple Optimization

Let’s discuss Azure Application Insights and the simple optimization we can do to avoid surprise bills. Azure Application Insights can be used to monitor and check our applications’ health, analyze logs and other metrics related to our application, and view other resources which are included in our Azure subscription. Many teams may have different objectives […]

Load More