Free Post security Investigating the safety of MFA methods: are authenticator apps secure? In this article we’ll take a look at the different types of MFA available and we’ll compare them from a security perspective. We’ll pose an important question: are authenticator apps secure? And we’ll explore how to keep authenticator apps safe to use as they evolve in the coming years.
Free Post architectureweekly Architecture Weekly #85 Frameworks killing Architecture, Architecture Characteristics classification and Understanding CDC
Free Post security Balancing security and usability Originally posted to Licel Blog As we integrate apps more deeply into our everyday lives, the need for robust security measures surges. It’s ironic, but the very security that
Free Post architectureweekly Architecture Weekly #84 Building Meta's Thread app, Pingora at Cloudflare, Mitigating Serverless cold start
Free Post architectureweekly Architecture Weekly #83 Distributed Systems Interview, Creating integrated tech strategy, Difficulty of Arch Decisions and Measuring Developer Productivity in Architecture Weekly #83
Free Post architectureweekly Architecture Weekly #82 Emerging Architectures for LLM apps, saving money with serverless and should that be a microservice?
Free Post architecture Seeing the Bigger Picture with Event Storming How do you understand what is a proper future vision for your system? Understanding the domain through Event Storming sessions might help. Here is our experience.
Free Post Architecture Weekly #81 Architecture Weekly Issue #81. Articles, books, and playlists on architecture and related topics. Split by sections, highlighted with complexity: 🤟 means hardcore, 👷♂️ is technically applicable right away, 🍼 - is an introduction
Free Post Architecture Weekly #80 Architecture Weekly Issue #80. Articles, books, and playlists on architecture and related topics. Split by sections, highlighted with complexity: 🤟 means hardcore, 👷♂️ is technically applicable right away, 🍼 - is an introduction
Free Post Frugal Software Architecture. Part 4: Embracing Lean and Agile Approach In our exploration of Frugal Software Architecture, we have already dived deep into the first two principles - strategic investments and cost optimizations. As we progress in this enlightening journey,
Free Post security Investigating iOS security vulnerabilities Originally posted to Licelus blog iOS is renowned for its robustness and its rigorous security measures. It's a closed ecosystem, with Apple strictly controlling both hardware and software.
Free Post Architecture Weekly #79 Architecture Weekly Issue #79. Articles, books, and playlists on architecture and related topics. Split by sections, highlighted with complexity: 🤟 means hardcore, 👷♂️ is technically applicable right away, 🍼 - is an introduction
Free Post Architecture Weekly #78 Architecture Weekly Issue #78. Articles, books, and playlists on architecture and related topics. Split by sections, highlighted with complexity: 🤟 means hardcore, 👷♂️ is technically applicable right away, 🍼 - is an introduction
Free Post security Why you should think twice about creating custom security solutions As the sheer range of cybersecurity threats widens, it can be tempting to want to create custom security solutions to deal with them. Sadly, though, this can lead to you simply reinventing the wheel. And the end result can actually be a less secure application.
Free Post architectureweekly Architecture Weekly #77 DevOps and CLoud InfoQ Trends Report, Decentralizing Architecture Practice and Designing Data Relation in a single table