Technology Blog

A Practical Guide to Application Authentication and Authorization

Introduction

Authentication (AuthN) answers “Who are you?” Authorization (AuthZ) answers “What are you allowed to do?”

In today’s complex distributed systems, it is crucial to ensure sensitive data is safeguarded, unauthorized access is prevented, and each request is examined with the correct identity and context. Trust cannot be automatically placed in the network or the requester in contemporary systems. Instead, each request must be validated throughout a sophisticated distributed environment, adhering to the foundational concept of the Zero Trust approach.

Falsafa: My AI Literary Companion

Introduction

Philosophy is a necessity, just like breath to life. It gives our life meaning, sharpens our focus, and provides a moral compass for navigation. It is the foundation of our personality, the source of our resilience, and the very thing that makes us human, enabling true connection and growth. It is, quite simply, our GPS for the journey of life.

I aim to develop an AI companion capable of animating my beloved characters and poems. I envision engaging in conversations with them, posing questions, and enjoying natural, human-like interactions that make it seem as though they are physically present with me.

Exception Storms and Memory Leaks

Introduction

Following a sudden increase in exceptions, the application’s memory usage steadily increases until its performance deteriorates and eventually results in a crash due to an OutOfMemoryError. Upon reviewing the logs, numerous instances of harmless exceptions like InvalidParameterException are observed. While these exceptions appear to be an indicator of the issue, it raises the question if they are the root cause.

This article delves into an unexpected hazardous phenomenon called the Exception Storm. It elucidates how a surge in exceptions, given specific circumstances, can trigger memory issues and potentially lead to system failure.