Python's Async IO has made writing concurrent applications a breeze. This article explores how Async IO can be used to achieve concurrency in Python.… Read More The post Concurrent programming using Python’s Async IO appeared first on The Armchair Critic.
The C in CIAM stands for the customer; this means that a business that wants to attract and retain customers should ensure that customer needs are met first. This post discusses some common mistakes we,… Read More The post CIAM and common misconceptions appeared first on The Armchair Critic.
GitHub Actions has made CICD easy. Couple it with the free hosting service offered by Firebase, you have a fully functional CICD pipeline ready for your frontend app completely free in no time. As frontend… Read More The post CICD for frontend with Firebase and GitHub Actions appeared first on The Armchair Critic.
GitHub Actions has made CICD easy. Couple it with the free hosting service offered by Firebase, you have a fully functional CICD pipeline ready for your frontend app completely free in no time. As frontend… Read More The post CICD for frontend with Firebase and GitHub Actions appeared first on The Armchair Critic.
React’s useEffect hook has indeed made life a lot easier. But there are times when you would most certainly miss the fine-grained control class-based components give you over a component’s lifecycle. One such time is when you… Read More The post Prevent useEffect’s callback firing during initial render appeared first on The Armchair Critic.
React’s useEffect hook has indeed made life a lot easier. But there are times when you would most certainly miss the fine-grained control class-based components give you over a component’s lifecycle. One such time is when you… Read More The post Prevent useEffect’s callback firing during initial render appeared first on The Armchair Critic.
Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app on your mobile phone. But have you ever wondered how an online service is able… Read More The post How does TOTP authentication work? appeared first on The Armchair Critic.
Before smartphones were popular, hardware tokens that produced a HOTP code were a popular way of performing two-factor authentications. Businesses gave their customers a small electronic device that generated a number when a button was… Read More The post How does HOTP authentication work? appeared first on The Armchair Critic.
HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and integrity of data transmitted. Here, authenticity is ensuring that the data was indeed sent by… Read More The post What is HMAC and how does it work? appeared first on The Armchair Critic.
I recently had to install and configure Jest in a React app written using Typescript and ran into quite a few roadblocks. So, I thought of detailing the steps I followed to overcome the difficulties.… Read More The post Jest for a Typescript-based React app appeared first on The Armchair Critic.
I recently had to install and configure Jest in a React app written using Typescript and ran into quite a few roadblocks. So, I thought of detailing the steps I followed to overcome the difficulties. I used Jest as the... Continue Reading → The post Jest for a Typescript-based React app appeared first on The Armchair Critic.
Lerna comes to our rescue when we are to manage multiple inter-dependent packages within a repository. Have a package that is a dependency of another and you don’t want to waste time building the dependency, publishing it to npm, and... Continue Reading → The post Fix React Issues in Lerna using Yarn Workspaces appeared first on The Armchair Critic.
Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in detail. To begin with, CIAM... Continue Reading → The post How does CIAM differ from IAM? appeared first on The Armchair Critic.
Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in detail. To begin with, CIAM... Continue Reading → The post How does CIAM differ from IAM? appeared first on The Armchair Critic.
Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0 authorization framework. This article discusses how this attack works in detail and how this attack can be prevented. If you... Continue Reading → The post The Authorization Code Redirect URI Manipulation attack in OAuth 2.0 appeared first on The Armchair Critic.
User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their resources by third parties. To understand how User Managed Access works, it is paramount that you understand how OAuth 2.0... Continue Reading → The post Getting started with User Managed Access (UMA) appeared first on The Armchair Critic.
OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On. The post Understanding OpenID Connect (OIDC) appeared first on The Armchair Critic.
This tutorial explains in detail how Redux can be integrated into your Flutter app to help manage the state of your Flutter app. The post Managing state in Flutter using Redux appeared first on The Armchair Critic.
There may be situations where you may have to take pictures remotely and view them. With a Raspberry Pi single board computer, Pi Camera and Socket.IO server, creating a DIY remote camera has never been easier. To create this remote... Continue Reading → The post DIY Remote Camera using Raspberry Pi, Pi Camera, and Socket.IO appeared first on The Armchair Critic.