ganeshghag.blogspot.com ganeshghag.blogspot.com

ganeshghag.blogspot.com

Idea Fountain

Tuesday, October 3, 2017. Server to server API calls Security. Calling Partner APIs from our application servers is a common use-case, a quick summary of options for securing such Server to server API calls. Sunday, August 13, 2017. Cloud, Elasticity and Microservices. The incentive to move to the cloud. The cloud provides for dynamic provisioning of resources like processing power, storage, network bandwidth, etc. It then follows logically, that enterprise applications that are deployed on the cloud...

http://ganeshghag.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR GANESHGHAG.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

November

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.0 out of 5 with 12 reviews
5 star
7
4 star
0
3 star
4
2 star
0
1 star
1

Hey there! Start your review of ganeshghag.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.2 seconds

FAVICON PREVIEW

  • ganeshghag.blogspot.com

    16x16

  • ganeshghag.blogspot.com

    32x32

CONTACTS AT GANESHGHAG.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Idea Fountain | ganeshghag.blogspot.com Reviews
<META>
DESCRIPTION
Tuesday, October 3, 2017. Server to server API calls Security. Calling Partner APIs from our application servers is a common use-case, a quick summary of options for securing such Server to server API calls. Sunday, August 13, 2017. Cloud, Elasticity and Microservices. The incentive to move to the cloud. The cloud provides for dynamic provisioning of resources like processing power, storage, network bandwidth, etc. It then follows logically, that enterprise applications that are deployed on the cloud...
<META>
KEYWORDS
1 idea fountain
2 posted by
3 ganesh ghag
4 1 comment
5 elasticity is important
6 enter microservices
7 containerization and choices
8 resilient distributed dataset
9 persist
10 list
CONTENT
Page content here
KEYWORDS ON
PAGE
idea fountain,posted by,ganesh ghag,1 comment,elasticity is important,enter microservices,containerization and choices,resilient distributed dataset,persist,list,integer,data,arrays,aslist,javardd,distdata,parallelize,string,distfile,textfile,datatxt
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Idea Fountain | ganeshghag.blogspot.com Reviews

https://ganeshghag.blogspot.com

Tuesday, October 3, 2017. Server to server API calls Security. Calling Partner APIs from our application servers is a common use-case, a quick summary of options for securing such Server to server API calls. Sunday, August 13, 2017. Cloud, Elasticity and Microservices. The incentive to move to the cloud. The cloud provides for dynamic provisioning of resources like processing power, storage, network bandwidth, etc. It then follows logically, that enterprise applications that are deployed on the cloud...

INTERNAL PAGES

ganeshghag.blogspot.com ganeshghag.blogspot.com
1

Idea Fountain: September 2013

http://ganeshghag.blogspot.com/2013_09_01_archive.html

Friday, September 13, 2013. Grails 2.3 released - provides out of box support for REST. But now.Grails can be used to develop service layers of an application, very rapidly and same services can very easily be exposed as REST interfaces, which can be consumed by a variety of clients including mobile clients. Heres how.Getting started, is so easy even a novice developer could do this. You can start by downloading the latest Grails 2.3 release. Go about creating a new grails app as usual. Http DELETE to ht...

2

Idea Fountain: Rapid development of REST webservices with persistence

http://ganeshghag.blogspot.com/2015/02/rapid-development-of-rest-webservices.html

Friday, February 6, 2015. Rapid development of REST webservices with persistence. Development of modern business applications, has to become faster and easier, if we are to meet business delivery demands, spanning over ever shorter cycles. Also we are now required to deliver softwares continuosly and incrementally, in an agile manner. Jump-starting the development process with the right tools and technolgies is the need of the hour. Well more recently, advancements made in the Spring Data JPA framework, ...

3

Idea Fountain: September 2014

http://ganeshghag.blogspot.com/2014_09_01_archive.html

Monday, September 8, 2014. Database multi-tenancy using Hibernate 4. With many business applications being written, with intent to be deployed on cloud, there is increasingly a need to design multi-tenancy into your application. For persistence layer multi-tenant design offers a few options:. Http:/ msdn.microsoft.com/en-us/library/aa479086.aspx. Separate database per tenant. Separate schema, same database per tenant. For the "separate connection pool per tenant approach". Import java.sql.Connect...This ...

4

Idea Fountain: April 2015

http://ganeshghag.blogspot.com/2015_04_01_archive.html

Wednesday, April 8, 2015. Databases for HA and DR. During a recent participation in a bid, responding to an RFP, I had to wear my ops hat and it was a refreshing change, from my dev endeavours in recent past. To know the basics of replication, the wikidpedia link for replication. Is very good. But first some basics. Background: why database synchronization is required? In any case, having mutiple copies of the database and trying to synchronize data across those databases is something you will have to in...

5

Idea Fountain: Databases for HA and DR

http://ganeshghag.blogspot.com/2015/04/databases-for-ha-and-dr.html

Wednesday, April 8, 2015. Databases for HA and DR. During a recent participation in a bid, responding to an RFP, I had to wear my ops hat and it was a refreshing change, from my dev endeavours in recent past. To know the basics of replication, the wikidpedia link for replication. Is very good. But first some basics. Background: why database synchronization is required? In any case, having mutiple copies of the database and trying to synchronize data across those databases is something you will have to in...

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL PAGES IN THIS WEBSITE

18

LINKS TO THIS WEBSITE

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: Mobile Apps Security – Are you worried?

http://smartsecurity.blogspot.com/2011/07/mobile-apps-security-are-you-worried.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Tuesday, July 26, 2011. Mobile Apps Security – Are you worried? Data Stored on Mobile Devices. In most mobile application designs, it is observed that the mobile device stores or caches some information. Due to limited constraints on the. Moving Substantial Business Logic Client Side. Relying on Client Side Data Validation. In current business scenarios, users need to access enterprise applications both from the web and the mobile devices&...

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: Getting Hands Dirty with Ettercap Tool

http://smartsecurity.blogspot.com/2010/06/getting-hands-dirty-with-ettercap-tool.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Monday, June 28, 2010. Getting Hands Dirty with Ettercap Tool. Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Subscribe to: Post Comments (Atom). View my complete profile. ACE Team at Micr...

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: March 2010

http://smartsecurity.blogspot.com/2010_03_01_archive.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Wednesday, March 10, 2010. About the 'Rugged' Initiative. As most of the readers on my blog would be knowing, the Security experts in February launched a new effort to ensure software is written from the ground up with security in mind - a philosophy and message they're aiming at people outside of the security industry. The Indian IT industry spends so much on training costs, as more than 70% of fresh graduates are not employable/productiv...

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: March 2011

http://smartsecurity.blogspot.com/2011_03_01_archive.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Thursday, March 17, 2011. IRCTC - India's Rail Ticket Booking Website which is sought to be a secure platform for the citizens booking their tickets has few simple security configurations missing. An example is the auto-complete not set to off on their payments page - a practice which most of the secure web applications follow for sensitive pages right from login page. Below is a snapshot. Links to this post. Tuesday, March 15, 2011. How T...

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: What do you say? Yes / No / Don't Care

http://smartsecurity.blogspot.com/2011/09/what-do-you-say-yes-no-dont-care.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Wednesday, September 28, 2011. What do you say? Yes / No / Don't Care. Subscribe to: Post Comments (Atom). He is involved in Application Security Consulting and establishing App Security across SDLC. He also conducts security workshops for the developer community. Besides interest in App Security, he likes Performance Testing and tuning of web applications. View my complete profile. AppSec: SearchSecurity.IN TechTarget. What do you say?

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: October 2009

http://smartsecurity.blogspot.com/2009_10_01_archive.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Thursday, October 08, 2009. Application security should be addressed in initial SDLC stages. IT applications are akin to the organization's blood vessels because they carry critical information and execute key processes. However, due to a peripheral approach to security, application security is often neglected. If you estimate risk correctly from the beginning, it will also help you to save on costs. According to an industry statistic,...

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: August 2009

http://smartsecurity.blogspot.com/2009_08_01_archive.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Friday, August 28, 2009. No Built-In Response.HTMLEncode in Java. Why doesn't Java have a built-in HTMLEncode function? With security vulnerabilities like Cross-Site Scripting (XSS) luring around since so many years, I am wondering why hasn't Java yet come up with its own function for Encoding chars which are malicious. I believe 'Sun' . sorry.'Oracle' should think of having this simple thing built-in. Links to this post.

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: January 2010

http://smartsecurity.blogspot.com/2010_01_01_archive.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Tuesday, January 26, 2010. Plenty of (IN)Secure Broadband Routers. For the Wireless Routers still exists in most parts of the country. The Mumbai terror attacks did bring in a concern for people using Wireless Networks and not have secured them. However, time and again I have been still snooping into the so-called. Wireless Networks because the routers admin password is still set to default. Crazy! 3 things that I see from this point:.

smartsecurity.blogspot.com smartsecurity.blogspot.com

Smart Security by Dharmesh M Mehta: OTP adoption from India to the US?

http://smartsecurity.blogspot.com/2010/11/otp-adoption-from-india-to-us.html

Smart Security by Dharmesh M Mehta. An Application Security Blog. Monday, November 01, 2010. OTP adoption from India to the US? One Time Password (OTP) is a password that is valid for only one login session. It is a popular authentication mechanism in India. It is essentially in use with Banking and Stock Broking Apps to do a two-factor authentication. SMSes on your registered mobile phone is been predominantly used as a medium to accomplish this second factor of authentication. It would be also nice if ...

UPGRADE TO PREMIUM TO VIEW 30 MORE

TOTAL LINKS TO THIS WEBSITE

39

OTHER SITES

ganeshgeet.blogspot.com ganeshgeet.blogspot.com

गणपती बाप्पा मोरया..

गणपती बाप्पा मोरया. प्रेमात मी. तुझ्या कृपेने दिन उगवे हा. Friday, June 27, 2014. तुझ्या कृपेने दिन उगवे हा, करुनी तव भजना. वंदितो तुजला गजवदना. सिंदुर वदना तुजला नमितो, तु अमुची प्रेरणा. सुखकर्ता तू दु:ख हरोनिया, तारी प्रभु सकळा. विघ्नविनाशक म्हणती तुजला, तू आमची प्रेरणा. वंदितो तुजला गजवदना. सर्व सुखाचा तू प्रभुदाता, विद्येच्या देवा. जनजीवनी तुच शुभकरा, शुभदिन फुलवावा. कर्पुगौरा गणनायक तू , गाऊनी तव भजना. वंदितो तुजला गजवदना. गजानना श्री गणराया. गणपतीचे बडबड गीत. जय गणेश देवा.

ganeshgembali.wordpress.com ganeshgembali.wordpress.com

Ganesh's Blog | My minds dump yard

My minds dump yard. August 11, 2016. Representing null values in a REST API. REST is been defacto standard for serving data to external consumers. While developing such REST APIs, I have come across an interesting basic and quite common case – what to do with attributes with null values in a json response. Continue reading →. July 28, 2016. DevOps : New thinking to automate software development tasks. Continue reading →. July 19, 2016. BackToBasics :Math Set operations on collections. July 12, 2016.

ganeshgems.com ganeshgems.com

Ganesh Gems Store | Home Page

Welcome to Ganesh Gems Store! Goin Down to the Bus Stop by TBird,. Jo bhi name dena h say Isreal uncut,. Madison Island VIP Membership - 1 Year,. Lorem ipsum dolor sit amet, consectetur atiscing. Donec tincidunt vitae nisi nec dictum. Our new range of. Please sign up to the Market mailing list to receive updates on new arrivals, special offers and other discount information. This is an enquiry about SKU:tiger-round-01. This is an enquiry about SKU:garnet-001. This is an enquiry about SKU:rose-quartz-01.

ganeshgeymeier.com ganeshgeymeier.com

ganeshgeymeier

ganeshghag.blogspot.com ganeshghag.blogspot.com

Idea Fountain

Tuesday, October 3, 2017. Server to server API calls Security. Calling Partner APIs from our application servers is a common use-case, a quick summary of options for securing such Server to server API calls. Sunday, August 13, 2017. Cloud, Elasticity and Microservices. The incentive to move to the cloud. The cloud provides for dynamic provisioning of resources like processing power, storage, network bandwidth, etc. It then follows logically, that enterprise applications that are deployed on the cloud...

ganeshghale.blogspot.com ganeshghale.blogspot.com

Artistic Endeavors

ganeshghate.com ganeshghate.com

Ganesh Ghate Welcomes You

Web Developer me@ganeshghate.com. I'm a web developer with specialization in Twitter-Bootstrap. I love coding in HTML5 , CSS3 , PHP , Javascript. Specifically I am addicted to Javascript. I am basically a sales person, and my interaction with web designing in 2012 led to discover my liking for making beautiful websites. Being sales person I care for my clients and I take extra efforts to make them happy.

ganeshghee.com ganeshghee.com

Welcome to Ganesh Ghee

Style="width: 150px; height: 40px; color: White; background-color: #ef4c52; border-radius: 10px; border: 0; cursor: pointer; font-weight: bold; font-size: 15px" /.

ganeshgheeoil.com ganeshgheeoil.com

Welcome to Ganesh Ghee

Ghee good for health. Welcome to Ganesh Ghee. His expertise and sound industrial acumen has enabled us to fetch a huge base of satisfied clientele. To process our range, we make us of finest grade ingredients that are sourced from trusted vendors of the market. Besides, we utilize the inputs of modernized machines and cutting-edge equipment to ensure that the range offered by us is hygienically processed. We offer a wide range of Liquid Ghee which is widely acclaimed by the clients for its hygienic proce...