MACRO NEPAL
Home
Blog
CHATBOT
CODE COMPILER
WEALTH ORBIT
awiskar acharya
Service Mesh Observability in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
A comprehensive observability implementation for Java microservices in service mesh…
JWT Validation with OPA in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Introduction to JWT and OPA JSON Web Tokens (JWT) are…
Policy Enforcement with OPA in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview Open Policy Agent (OPA) is a general-purpose policy engine…
Snyk Vulnerability Scanning in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview Snyk is a developer security platform that helps find…
Implementing Notary for Container Image Trust in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Notary is a critical component in the container security ecosystem…
Fault Injection in Istio in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
1. Istio Fault Injection Configuration Virtual Service with Fault Injection…
Trivy Scanner for Container Security in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Trivy is a comprehensive and versatile security scanner that detects…
A Comprehensive Guide to OWASP Dependency-Check in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
In modern software development, applications are built using numerous third-party…
gRPC with Istio in Java
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
Overview gRPC is a high-performance RPC framework, and Istio is…
Securing the Java Supply Chain: A Guide to Aqua Security Scanning
By
awiskar acharya
|
11
Nov, 25
|
0 Comments
|
In the modern software development lifecycle, Java applications are built…
Previous
1
…
189
190
191
192
193
…
276
Next
💬
Macro Nepal Helper
×
→
Thinking...