Analytics Use Cases that are redefining BFSI In today’s world, banking institutions have the benefit of redefining their products and services – with data and analytics. Decisions to redefine banking by driving profit and mitigating risks can be obtained from data. Using Analytics Banks are able to identify and understand consumer behaviour trends and provide […]
Application SecurityTechnology
Android has been the most used mobile operating system till date. With the huge base of end-users, Android has been guilty of hosting numerous security related bugs in the past. With the latest version of Android 6.0 namely Marshmallow being released, I expected to see a few changes in the security model. Change in the permissions […]
General Use Case When any application fails in production then it is necessary is to track how the execution went. For this the standard approach is to add logs. Logs can be helpful in tracking how the execution went but tracking the execution becomes more difficult in multithreaded applications. The logs start to get jumbled for various threads. […]
The process of migrating your website to AEM involves a number of preliminary steps followed by the three steps of an ETL cycle. The preliminary steps involve: 1. Creating a site inventory: This involves compilation of all web pages and its properties that are to be migrated to AEM. 2. Creating a sitemap and a […]
Introduction Like C, I would like to use C functions in Objective-C class so i could use C functions anywhere anytime without using class name. Defining function: Function definition in C programming language is as follows − return_type function_name(parameter list) { body of the function } In Objective-C, you can create a Objective-C class having NSObject […]
Full Text Search is searching a string among multiple coulmns of a table to fetch the more relevant records. In this blog we will demostrate how to implement full text search to fetch relavent responses. There are few simple steps to implement full text search in mysql- 1. Create table with full text schema [java] […]
You can check How to set up CAS Rest api with JDBC Authentication. for setting up CAS server for your application. Now if you want to test if your CAS server is working properly for REST calls then you can use the following code and you need to check for the following things. You need to […]
You can allow Cross Domain Ajax calls to an application by just registering a new filter and then configure it to Allow-Origin : {your domain’s} or you can use a wild card “*” to allow the calls from all domains. You can even Define the Custom Headers your application supports by defining them in a […]
Application SecurityTechnology
We saw different implementations of a password reset functionality to ensure application security along with their best practices in the first and the second blogs of the series. In this final blog of the series, we will discuss the concept of Multi-Factor Authentication (One Time Passwords i.e. OTP) for the implementation of a reset password […]