Speech recognition and speech synthesis have had a dramatic impact on areas like accessibility and more. In this post, take a deep dive into Web Speech API.
This article is about how to secure WSO2 Microintegrator on microservices integration deployment. It describes how to use keystores, secure vault, and more.
In this post, learn how relational and NoSQL databases, Google Cloud Spanner and DataStax Astra DB, optimize distributed joins for real-time applications.
In this article, learn how to create an immersive metaverse experience using the Web Audio API provided by web browsers to implement the spatial audio effect.
Spring Data JPA replacement with Spring Data JDBC may be a tricky task. In this post, have a look at tips, tricks, and traps waiting for you along the way.
RFC 7807 not only helps client developers. It's a tremendous help for API implementors as it provides quick guidelines to avoid reinventing the wheel on every project.
Have you heard about SOPS? If you have already been in a situation where you needed to share sensitive information with your teammates, this is for you.
Is API mocking in unit tests important, or does it do nothing? I think the answer is a bit more nuanced, but we do need such tests to reduce daily churn.
Navigating the world of privacy and compliance is no trivial task. In this post, take a look at the data privacy API: the what, the why, the how, and the who.
How can an attacker exploit leaked credentials? In this new series, we try to answer this question by imagining plausible attack scenarios. Second case: an AWS secret is found in a private repository.
As my geo-distributed app development journey ends, let’s look at several database multi-region deployment options to keep the read and write latency low no matter the user’s location.