This post is about PKCE [RFC7636], a protection mechanism for OAuth and OpenIDConnect designed for public clients to detect the authorization code interception attack.
The mistake of choosing a path towards a given architecture or technology on the basis of so-called best practices articles found online is a costly one.
How Hystrix works as a NightWatch?
On of the challenges transition from building monolithic systems is understanding how to enable communications between microservices.
7-part series on microservices application development.
Some of the key benefits of moving to a microservices based architecture on the Cloud.
Is an API-centric architecture vulnerable to classic web applications attack vectors like XSS and CSRF?
What is JHipster doing in the API management world?
Dropwizard and Spring boot comparison.
Article from Red Hat team on how they used WildFly Swarm to shrink the application from 45 megabytes to only 2243 bytes.
Author compares the two by taking a look at their backgrounds, their programming styles, and how they deal with concurrency.
There are several traps you can fall into without deep understanding of its fundamentals.