Jetpack Compose, the much-awaited UI toolkit from Google, is finally production-ready. With the power and flexibility of the declarative UI paradigm and access to low-level animation APIs, it is about to take the Android developer experience to a whole new level.(more…)
Many data security and privacy regulations apply to organizations using Adobe Campaign. In addition to complying with state-mandated regulations, organizations also choose to implement the ISO/IEC 27001 global security standard as a best practice. ISO-27001/27002, a supplement to this standard, recommends forcing password reset at periodic intervals. Since Adobe Campaign usually has plenty of operators, identifying and resetting each password can be a tedious task. Let me show you how to reset operator passwords at one go using Adobe’s SOAP methods.(more…)
Video tracking applications are becoming commonplace with a growing number of use cases such as perimeter surveillance, asset tracking, medical imaging, and traffic violation monitoring. One of the problems that a developer must tackle while building a video tracking application is server overload.(more…)
Regardless of the many technological leaps made over the past decade, firms in the healthcare, insurance, and finance sectors still deal with a staggering amount of paperwork. Because of the lack of unified data platforms, it is still a common practice to use paper documents when there is a need for ad hoc data transfer between organizations. This is especially true in the case of insurance companies in India, which require you to attach medical records from hospitals with the claim request forms.(more…)
Adopting an architecture that meets specific user requirements during setup, you can guarantee optimal performance from your Amazon Redshift cluster. Let us take a look at some of the architectural choices that are available to manage workload and steer clear of outages.(more…)
In 2020, when a surging pandemic and safety protocols shuttered many offices, we were among the IT firms to switch entirely to remote work. We adapted to its rhythms almost instantly, logging into work like clockwork, collabing over Zoom and Meet, and diligently meeting deadlines and release dates. Access to internal systems and data was something to be ironed out. An in-house mobile application became the need of the hour. Building the iOS app was no sweat but the distribution path wasn’t so clear-cut at first.
I’ll soon explain how we sorted this out.(more…)
This post is for anyone who’s trying to implement Public Key Info Hash SSL Pinning in iOS using TrustKit. The process is very straightforward except when you goof up by missing a tiny detail. A lot of documentation is already available on this topic. I’m just bringing the whole process under one roof.(more…)