Tech

Configuring CORS (Cross-Origin Resource Sharing) in Micronaut

Introduction: Cross-Origin Resource Sharing (CORS) is an important security feature implemented by web browsers to prevent malicious websites from accessing resources on other domains. In a Micronaut application, configuring CORS properly ensures that your APIs can be accessed securely from web applications hosted on different origins. In this blog post, we’ll explore how to configure…

Micronaut

How To Serve PDF Files from a Micronaut Controller

In web applications, serving static files like PDFs is a common requirement, especially when dealing with documents, reports, or downloadable content. Micronaut, a modern JVM-based framework for building microservices and serverless applications, provides convenient features for handling file downloads from controllers. In this blog, we’ll explore how to serve PDF files from a Micronaut controller…

Leetcode

739. Daily Temperatures

In the realm of algorithmic problem-solving, certain patterns and techniques emerge as powerful tools for tackling a variety of challenges. One such technique involves the clever use of stacks to efficiently solve problems that require finding the next greater element or value in an array. In this blog, we’ll explore how to leverage the stack…

Tech

Solving couldn’t get current server API group list

In Kubernetes, administrators and developers may encounter various errors during cluster management and application deployment. One common error is “Couldn’t Get Current Server API Group List,” which can occur when interacting with the Kubernetes API server. This error can disrupt operations and hinder troubleshooting efforts, but understanding its causes and solutions is crucial for maintaining…

Tech

Zero Trust in Cyber Security

Cyber Security Invloves securing multiple aspect of business which includes application, data, network and physical devices. Today we will explore the Network part of Cyber security and will discuss Zero Trust Principle in great detail. What is Cyber Security? Cybersecurity involves protecting computer systems, networks, and data from unauthorised access and cyber attacks.In today’s digital…

Tech

Resetting Kafka Consumer Offset in Kafka Connectors

Kafka Connectors are a crucial component in building scalable and fault-tolerant data pipelines. However, there are situations where you may need to reset the consumer offset, whether due to unexpected issues, changes in data schema, or other operational requirements. In this blog post, we will delve into the various aspects of resetting Kafka consumer offsets…

Tech

Understanding MySQL Binary Logs

In the vast landscape of database management, MySQL’s binary log emerges as a silent guardian, recording the ebbs and flows of data modifications within the server. This indispensable component plays a pivotal role in tasks ranging from data replication to point-in-time recovery. In this exploration, we embark on a journey into the intricacies of MySQL…

Leetcode

1657. Determine if Two Strings Are Close

String closeness, in the context of this problem, involves evaluating whether two words can be considered “close” by meeting certain criteria. The criteria include having the same set of characters and the same frequency distribution of those characters. The closeStrings method endeavors to address this challenge. Unpacking the Solution Basic Check: The basicCheck method ensures…