Solutions Infini SMS gateway integration using Node.js, AWS lambda & API Gateway

AWS lambda AWS Lambda runs your code on a high-availability compute infrastructure and performs all of the compute resource management including the operating system and server maintenance, automatic scaling and code monitoring, capacity provisioning, etc., which makes it ideal for sending messages. Node.js Support The AWS SDK for Node.js enables developers to build libraries and applications that use AWS services. You can use the JavaScript API in the browser and inside Node.js applications on the server. API Gateway Amazon API Gateway manages all the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including [...]
Read more
FacebookTwitterGoogle+Share
Posted by
No Comments

Elastic Search Query to Retrieve Records from Elastic Server

Elastic Search is an open-source search tool that is built on Lucene but natively it is JSON + RESTful. Elastic Search provides a JSON-style domain-specific language which can be used to execute queries, and is referred as the Query-DSL. The search API allows us to execute a search query and get back search hits that match the query. Elastic search will fetch the records at lightning speed because of schema-less table structure. The query can either be provided using a simple query string as a parameter or using a request body. Here I am showing how to write queries for [...]
Read more
Posted by
2 Comments

Source Code Generation using Razor Template Engine for Both Client Side and Server Side

Automating Source code generation can be surprisingly easy and will reap major benefits. It will help you develop 90% of the API’s for any project in just a button click. The primary benefits of automating source code generation are shown below in the form of a Bar chart. Explanation Creating dynamic source code (Controller, facade, and Dao including interfaces) using code templates and razor template engine. Steps to be followed to generate controller code are as follows 1. Create a controller template and keep only the common operations. Rename the file with extension as .txt. 2. Inside the file, where [...]
Read more
Posted by
No Comments

Automating Deployment of AWS Lambda

AWS Lambda is a compute service that lets you run code without provisioning or managing servers. AWS Lambda executes your code only when needed and scales automatically, from a few requests per day to thousands per second. Deploying Codes into AWS Lambda through AWS Web Console is insecure and time taking, since every time user needs to login into AWS Lambda console and then they have to upload the zip file or need to provide AWS S3 file path manually. To overcome this issue, there is a very simpler way to automate the deployment process as shown in the below [...]
Read more
Posted by
No Comments

Secure Your Smartphone with Android Device Manager

Smartphones have become an intrinsic part of our daily life, and without them, we feel like only half a person. We spend hundreds of dollars to buy a smartphone with high-end features and store or share our personal data with friends of family members. But, unfortunately, what if your phone is stolen or misplaced? How to locate your phone or at least wipe the sensitive data? Don’t worry; Android has a solution for you! Android has a great native tool, Android Device Manager which helps to locate your device and remotely wipe all the data from the phone. However, you [...]
Read more
Posted by
No Comments

WebComponent Vs Angular Formly – Issues in Displaying Forms in Firefox and Safari Browsers

I would like to share a quite interesting stuff with you pertaining to Angular Formly. We at Vmoksha Technologies have set our goal to write optimized code lines with quality. To attain our goal, we as a team, lean towards using new techniques that are contemporary to today’s software development. One such framework is Angular.js, a quite interesting framework, which we have used in our recent web projects. As an extension to it, we went ahead exploring the feature that lets you generate the HTML forms – Angular-Formly.   Smooth Sail, until you hit rock bottom! Yes. During the testing [...]
Read more
Posted by
2 Comments

Virtual Hosting Using Nginx Server

Nginx is a web server, which can also act as a reverse proxy, HTTP server, IMAP/POP3 proxy server as well as a load balancer. It is well known for its stability, high performance, simple configuration, rich feature set, and low resource consumption. So, we can deploy our web applications like HTML pages and PHP-related applications into this server directly. Let’s see How to Configure the Nginx as a Reverse Proxy/Virtual Hosting Purpose #1. Deploy the nginx application in any server (I am taking Ubuntu System). #2. Choose any domain/sub-domain name, and do the C-name configuring that domain name to nginx [...]
Read more
No Comments

Setting up a Secure Email Engine using Amazon SES

Cloud computing, also known as on-the-line computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, storage, applications, servers, and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide enterprises and users with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a [...]
Read more
1 Comment

Authentication of Edge-Device in AWS IoT

Security is the major concern for any IoT system even if it is just some inconsequential data. Because the future of the technology is IoT and an IoT system can be built to control something as insignificant as a thermostat to something as significant as autopiloting a car. AWS has not taken IoT security as an afterthought but as a security-first while designing their AWS IoT platform. AWS IoT uses MQTT to receive messages from the edge devices. Since MQTT doesn't have a strong security (it has a minimal password based security), they use 'Mutual authentication TLS' i.e. the device [...]
Read more
Posted by
No Comments

DEFECT LIFE CYCLE

Defect life cycle, a.k.a Bug life cycle is the journey of a defect cycle from its identification to its closure. A defect undergoes different states during its lifetime. But before going deep about the defect life cycle phases, it is important to know few fundamentals. Error - Defect - Failure Finding flaws in software has never been easy. Rather, it has always appeared to be challenging for the entire team, who are working on its successful completion. The words Effect, Defect & Failure seem to be same, but their meaning varies depending on the context/situation. Error leads to Defect, which [...]
Read more
3 Comments