Skip to main content

Information Architecture

Puzzle

The 1001st Piece in your 1000 Piece Puzzle: .NET Default Interface Functions

I recently worked with a client who wanted a reasonably large subsystem added to Optimizely that would add automated management to their content. While cutting the code for this, I found myself writing similar code across multiple classes. I had to write it that way: 1) The client was currently on CMS11 and didn’t have […]

Technology

Create Workato Custom Connector Locally

Workato Introduction Workato is a low-code/no-code, cloud-based iPaaS Solution that is hosted on public cloud infrastructure from Google Cloud Platform and Amazon Web Services (AWS). It means everything you create here is a drag-and-drop application component that resides on cloud.  Workato Connector To achieve any automation in the Workato tool, we create a recipe. The […]

Image009

Kubernetes Multi-cluster Management – Part 1

Introduction With more and more organizations adopting Kubernetes across multiple teams, the need for IT to provide a way for these teams to quickly provision and configure clusters is increasing fast. This is not only true in cloud environments but also at the edge, and from a practical standpoint, adding more clusters can become exponentially […]

Feature

Leveraging MuleSoft’s API Led Connectivity and Event-Driven Architecture with Solace

Organizations today are going into a rapid digital transformation. With MuleSoft’s API Led connectivity approach, the integration strategy of the enterprises is now going towards more reusability with quicker deliverables of projects through discovery, self-service, and reusability. But what if we mix the flavor of Event Driven Architecture also into the Enterprise’s Integration Strategy? With this blog, […]

AEM dispatcher security

How Good is your AEM Security? – AEMaaCS and 3rd Party Dependencies

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I cover security issues and mitigations specific to AEM.  In this final post, […]

Digital cloud linking on-premises to Azure VMware Solution

Fun with custom Sitecore Processors, a look into the future (of your Sitecore content)!

This is a little P.O.C. I worked out a while ago that allowed for the creation of a custom a preview site where a user could tack on a date & time via the QueryString to see what the content would look like on that date. Only requirements were 1. it had to be friendly […]

Person Testing Different Business Processes

Introduction to Event Driven Microservices

What is a Microservice? Many Large-Scale Software Projects Employ the architectural approach known as a Microservice System. Efficiency, dependability, performance, and scalability are to be increased. A single application can be developed using the microservice architectural style as a Collection of Small Services, each of which runs in its own process and Communicate with other […]

Dice with words on the faces, reading "Manage Your Risk"

How good is your AEM Security? – Mitigation Tools

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/).  There are already many resources on generic mitigation for these vulnerabilities.  So instead, in this series, I will cover security issues and mitigations specific to AEM.  Here I will […]

Two programmers working together with lines of code superimposed over them

How good is your AEM Security? – Denial of Service

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Denial […]

RNSecurity

How good is your AEM security? – Sling Resolution

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM.  Today’s topic is Sling […]

Data Warehouse 886x590

Deep Dive into Data Warehouse Concepts..!

What is data warehouse? Data warehouse is a relational database designed for analytical needs. It is the act of organizing and storing data in a way to make its retrieval efficient and insightful. It is also called as the process of transforming data into information. Its functions based on OLAP (Online analytical processing). It is […]

How good is your AEM security? – XSS

Large scale data breaches and critical security vulnerabilities have companies thinking about security more than ever.  Many developers are familiar with the OWASP top 10 (https://owasp.org/www-project-top-ten/) and there are already many resources on generic mitigation for these vulnerabilities.  Instead in this series, I cover security issues and mitigations specific to AEM. XSS and AntiSamy As […]

Load More