When working in the corporate context, most of the time application packages / libraries will be hosted in a private repository that is managed by Nexus or other artifact management platforms. This short article will show you how to configure pip to install packages from private repositories (with authentication).
SSL has been around for long enough you’d think that there would be agreed upon container formats. And you’re right, there are. But it’s too many. First, we will look at formats that show up from time to time, like in a lot of places
Recently, I set up a simple RESTful APIs service. To enhance the speed of distribution and provide a better load balance for my micro-service, I put it behind Route53 and Cloudfront. But when I tested using PostMan, I was caught off-guard by a simple error.
Backend Services enhance its application’s security by various methods and one of trending technique is Request Signing. It’s crucial to verify that your requests are not tampered with during transport, and this is achieved by signing the requests with a predefined signature provided by Clients.
It’s important to define the technical ladder for employees, especially in an internet company. It will help unify the title of the position, clarify the corresponding relationship between job title and its responsibilities, adapt to the needs of the internationalization and the technical advancement of the whole company. This specification is specially formulated based on those requirements.