Posts

Showing posts from February, 2021

Decision Making statements in C Programming

Decision-Making statements in C Programming In this tutorial, we will study decision-making statements in c, the if statement, else statement, and the if-else statement. What are the decision-making statements? Decision Making can be understood by using an example, the age of the student is stored in two-variables but if we want to print the age of the student we can use the decision-making statements (if, if-else, else if, Switch) in this situation. What are if statements? The If statement uses the curly braces { } for defining the block. If the condition is true then the statement inside the block is executed. And if the condition is false then the compiler skips the statements inside the block. The if statement can be used as many times as we want to. if(condition) { /* Statements */ } What are the if-else statements? It is similar to the if statement but in this, the else block is added and the else is executed when the condition in the if is false. The If-Else Statement defines ri

Secure React SPA using Keycloak with OpenID Connect in 2021

Image
In the light of my previous post  “ Secure React SPA using Azure Endpoints with Authorization code flow ”  I realized that configuring multiple providers with you application needs lots of coding and configuration and specially when you want to stick with Authorization code flow for all the providers. While Azure, Google supports a request from cross origin requests in a way and on other hand Facebook strictly doesn’t support it. (So we needed to create a proxy server to modify CORS policy to get your request accepted). 1. Introduction Thanks to  WildFly  developer community for developing a open source project  Keycloak . “ Keycloak  is an open source software product to allow  single sign-on  with  Identity and Access Management  aimed at modern applications and services” as from Wikipedia. All you need to do is keep Keycloak application server running on a machine whether it is on same domain or cross domain doesn’t matter. In this post we are going to learn about running a Keycloak

How to optimizations by Angular in 2021?

Image
H ave you ever wondered How Angular renders all the HTML, CSS, Typescript files present in the application into the browser? What happens to the code when the application is run in production(prod) mode? What if the developer accidentally creates any component or any piece of code that is not used anywhere in the application? So after reading this article one should be able to answer the above questions. Let’s dive into the topic. Angular implicitly or explicitly does some optimizations for the application. They are: Bundling AOT Compilation Minification Uglification Tree shaking Let’s get into the above-mentioned ones in detail. Bundling :  Bundling is the process of combining code in multiple files into a single file. So during compilation, Angular generates 5 javascript files and loads them into the application. They are : inline.bundle.js (or) inline.js polyfills.bundle.js (or) polyfills.js main.bundle.js (or) main.js styles.bundle.js (or) style

All About Software Architecture for 2021 Developers

Image
Introduction In this article, I will try to explain what architecture and clean architecture is, and architecture's role in projects. Examples of web architecture application Let's consider an example of a service with one architectural level (Single Tier) In an application with one architectural level, the user interface, business logic, that is, the backend part of the application and the database are on the same server An example of an application with one architectural level are applications such as MS Office, GIMP Benefits of using a single-layer architecture Very little or no delay in the interaction of components due to the fact that the components are located on the same server Although it largely depends on the machine's power and software hardware requirements, to measure the real performance of a single-tier application In addition, the user's data remains on his machine and does not need to be transferred over the network. This ensures data security

Fintech 4.0 — How Technology Is Reshaping The $5 Trillion Insurance Sector

Fintech 4.0 — How Technology Is Reshaping The $5 Trillion Insurance Sector The idea of protection traces all the way back to antiquated history with the primary type of composed strategy showing up in the code of King Hammurabi, about 3,800 years prior. Vendors who acquired assets would pay a little charge to moneylenders, and in return, the banks would drop the advance on the off chance that merchandise was lost. Quick forward to the present time, and it is an almost $5 trillion worldwide industry. It is frequently considered as a sluggish traditionalist area impervious to change, however, the phenomenal speed of development is significantly changing the protection business scene. Changing socioeconomics and shopper conduct, move from resource possession to leasing, expanded interconnectedness, the rise of shared economy and Airbnb plans of action, are profoundly affecting the area. A.I., IoT, and decentralized record advancements (DLTs) are key empowering agents for the area to react