Categories

security

Json Web Token(JWT)

JSON Web Token (JWT) A JSON Web Token (JWT) is an open standard for creating and transmitting information between two parties as a JSON object. Authenticate users and authorize them...

In security, jwt, Nov 23, 2023

Access and Refresh Tokens

Access Tokens and Refresh Tokens

In security, jwt, Nov 23, 2023

Tableau JavaScript API

Tableau JS API

In security, jwt, Nov 14, 2023

jwt

Json Web Token(JWT)

JSON Web Token (JWT) A JSON Web Token (JWT) is an open standard for creating and transmitting information between two parties as a JSON object. Authenticate users and authorize them...

In security, jwt, Nov 23, 2023

Access and Refresh Tokens

Access Tokens and Refresh Tokens

In security, jwt, Nov 23, 2023

Tableau JavaScript API

Tableau JS API

In security, jwt, Nov 14, 2023

API Authorization (Types)

AWS Secrets Lambda Extension to Cache Secrets

AWS Secrets Lambda Extension to Cache Secrets

What is Secret Manager? Aws Secret Manager is a service provided by AWS to store secrets i.e. passwords, credentials, third-party keys, or any such confidential information.

In AWS Secrets Lambda Extension to Cache Secrets, Dec 09, 2023

Streaming Protocols

HLS Video Streaming

HLS Video Streaming

In Streaming Protocols, Dec 09, 2023

postgis

PostGIS

What is PostGIS? PostGIS turns the PostgreSQL Database Management System into a spatial database by adding support for the three features: spatial types, spatial indexes, and spatial...

In postgis, Dec 09, 2023

AWS API Gateway Cost Analysis

AWS API Gateway Cost Analysis

AWS API Gateway cost Analysis

In AWS API Gateway Cost Analysis, Dec 16, 2023

Geographic Information Systems

Geopandas

What is Geopandas ?

In Geographic Information Systems, Dec 16, 2023

LUIGI

LUIGI

WHAT IS LUIGI? WHY DO WE USE IT?

In LUIGI, Dec 22, 2023

Github Commands

Github

Github Part-2

In Github Commands, Feb 17, 2024

Github

Git CommandsGit is a version control system used for tracking changes in computer files. It is generally used for source code management in software development. Git is used to tracki...

In Github Commands, Jan 12, 2024

AWS Security

Guildelines of AWS Security Audit(USRetina experience)

Guidelines on AWS security Audit (USRetina experience)

In AWS Security, Feb 17, 2024

AWS Step Functions

AWS Step Functions   

In AWS Security, Feb 03, 2024

Training - Phishing

Training - Phishing

Social Engineering

In Training - Phishing, Apr 26, 2024

Conference Call Etiquette

Conference Call Etiquette

Conf Call Etiquette DOsPrepare to introduce yourself if it’s your first time - 3-4 statements are good.Log in to the call a min or two before. This gets you the time to chat informal...

In Conference Call Etiquette, May 02, 2024

Chatbot with Langchain and AWS Lambda

Serverless ChatBot with Langchain and AWS Lambda

Serverless Chatbots with Langchain and AWS LambdaA serverless chatbot is a chatbot that leverages by the use of serverless computing platforms like AWS ECS or Lambda.

In Chatbot with Langchain and AWS Lambda, May 02, 2024

Cloudfront Signed URL

Cloudfront Signed URL

Cloudfront Signed URL

In Cloudfront Signed URL, May 02, 2024

Py-Script

Py-Script

Py-Script

In Py-Script, May 02, 2024

CORS

CORS

Origin - HTTP

In CORS, May 10, 2024

Reference Table

View VS Materialized View

AWS SSM

AWS SSM

AWS SSMSimple Systems Manager

In AWS SSM, Jun 01, 2024

Mirth Connect

Mirth Connect

Mirth Connect  Mirth Connect is a Open Source cross-platform interface engine used in the healthcare industry that enables the management of information using bi-directional sending o...

In Mirth Connect, Jun 01, 2024

Software Quality Management

Software Quality Management

Software quality - DefinitionIEEE Definitions : The degree to which a system, component, or process meets specified requirements. The degree to which a system, component, or process...

In Software Quality Management, Jun 07, 2024

Dimensional Data Modelling

Dimensional Data Modelling

Dimensional-data-modelling-Dimensional data modeling is a design technique used in data warehousing to structure data for easy retrieval and analysis. It is particularly well-suited f...

In Dimensional Data Modelling, Jun 15, 2024

UUIDV4 VS UUIDV7

UUIDV4 VS UUIDV7

UUIDv4 Vs UUIDv7Versions of UUID and Their Pros and Cons

In UUIDV4 VS UUIDV7, Jun 15, 2024

AWS

Optimal AWS Resources

Choosing optimal AWS resourcesLambda Function URL, VPC Gateways & Endpoint

In AWS, Jun 28, 2024

RCM

Revenue Cycle Management

Optimizing Revenue Cycle Management (RCM) in Healthcare: A Strategic, Data-Driven Approach

In RCM, Apr 06, 2025

Whatsapp Appointment Booking

Appointment Booking Whatsapp

How Korv EMR WhatsApp Appointment Booking Is Transforming Clinic Scheduling in 2025

In Whatsapp Appointment Booking, Nov 14, 2025

Celltherapy

Celltherapy

In Celltherapy, Nov 21, 2025

OptiKorv

Object Detection

Real-time Object Detection

Real-Time Object Detection: How Modern AI Vision Powers Smarter Business Operations

In Object Detection, Mar 19, 2026