Skip to content
The Armchair Critic

"It takes considerable knowledge just to realize the extent of your own ignorance."

  • Home
  • Alternative Facts
  • Mansplainings
  • Tech Journal
  • Cricket
  • Cricket Machan
  • Covfefe
    • Wallpapers
    • Poems
  • Contact
  • Asgardio OIDC JS SDK: Bootstrap in three easy steps

    Asgardio OIDC JS SDK: Bootstrap in three easy steps

    • by Theviyanthan Krishnamohan
    • Posted on November 26, 2020November 26, 2020
    • in Tech Journal
    • Leave a comment on Asgardio OIDC JS SDK: Bootstrap in three easy steps

    Asgardio OIDC JavaScript SDK allows developers to implement OIDC authentication in their Single Page Applications in a fast and secure manner, especially when using the WSO2 Identity Server as the Identity Provider.  The SDK offers three…

    Read More

  • Concurrent programming using Python’s Async IO

    Concurrent programming using Python’s Async IO

    • by Theviyanthan Krishnamohan
    • Posted on August 20, 2020August 20, 2020
    • in Tech Journal
    • Leave a comment on Concurrent programming using Python’s Async IO

    Python’s Async IO has made writing concurrent applications a breeze. This article explores how Async IO can be used to achieve concurrency in Python.…

    Read More

  • CIAM and common misconceptions
    Photo by Andrea Piacquadio on Pexels.com

    CIAM and common misconceptions

    • by Theviyanthan Krishnamohan
    • Posted on August 14, 2020August 14, 2020
    • in Alternative Facts
    • Leave a comment on CIAM and common misconceptions

    The C in CIAM stands for the customer; this means that a business that wants to attract and retain customers should ensure that customer needs are met first. This post discusses some common mistakes we,…

    Read More

  • CICD for frontend with Firebase and GitHub Actions

    CICD for frontend with Firebase and GitHub Actions

    • by Theviyanthan Krishnamohan
    • Posted on August 10, 2020August 10, 2020
    • in Tech Journal
    • Leave a comment on CICD for frontend with Firebase and GitHub Actions

    GitHub Actions has made CICD easy. Couple it with the free hosting service offered by Firebase, you have a fully functional CICD pipeline ready for your frontend app completely free in no time.   As frontend…

    Read More

  • Prevent useEffect’s callback firing during initial render

    Prevent useEffect’s callback firing during initial render

    • by Theviyanthan Krishnamohan
    • Posted on July 4, 2020July 4, 2020
    • in Tech Journal
    • 1 Comment on Prevent useEffect’s callback firing during initial render

    React’s useEffect hook has indeed made life a lot easier. But there are times when you would most certainly miss the fine-grained control class-based components give you over a component’s lifecycle. One such time is when you…

    Read More

  • How does TOTP authentication work?

    How does TOTP authentication work?

    • by Theviyanthan Krishnamohan
    • Posted on April 21, 2020April 21, 2020
    • in Mansplainings
    • Leave a comment on How does TOTP authentication work?

    Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app on your mobile phone. But have you ever wondered how an online service is able…

    Read More

  • How does HOTP authentication work?

    How does HOTP authentication work?

    • by Theviyanthan Krishnamohan
    • Posted on April 21, 2020September 24, 2021
    • in Mansplainings
    • 1 Comment on How does HOTP authentication work?

    Before smartphones were popular, hardware tokens that produced an HOTP code were a popular way of performing two-factor authentications. Businesses gave their customers a small electronic device that generated a number when a button was…

    Read More

  • What is HMAC and how does it work? 

    What is HMAC and how does it work? 

    • by Theviyanthan Krishnamohan
    • Posted on April 20, 2020April 20, 2020
    • in Mansplainings
    • 1 Comment on What is HMAC and how does it work? 

    HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and integrity of data transmitted. Here, authenticity is ensuring that the data was indeed sent by…

    Read More

  • Jest for a Typescript-based React app

    Jest for a Typescript-based React app

    • by Theviyanthan Krishnamohan
    • Posted on November 28, 2019February 12, 2020
    • in Tech Journal
    • Leave a comment on Jest for a Typescript-based React app

    I recently had to install and configure Jest in a React app written using Typescript and ran into quite a few roadblocks. So, I thought of detailing the steps I followed to overcome the difficulties.…

    Read More

  • Fix React Issues in Lerna using Yarn Workspaces

    Fix React Issues in Lerna using Yarn Workspaces

    • by Theviyanthan Krishnamohan
    • Posted on November 25, 2019November 25, 2019
    • in Tech Journal
    • Leave a comment on Fix React Issues in Lerna using Yarn Workspaces

    Lerna comes to our rescue when we are to manage multiple inter-dependent packages within a repository. Have a package that is a dependency of another and you don’t want to waste time building the dependency,…

    Read More

  • How does CIAM differ from IAM?

    How does CIAM differ from IAM?

    • by Theviyanthan Krishnamohan
    • Posted on November 19, 2019February 13, 2020
    • in Mansplainings
    • 1 Comment on How does CIAM differ from IAM?

    Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in…

    Read More

  • The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

    The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

    • by Theviyanthan Krishnamohan
    • Posted on October 14, 2019October 15, 2019
    • in Mansplainings
    • Leave a comment on The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

    Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0 authorization framework. This article discusses how this attack works in detail and how this attack…

    Read More

  • Getting started with User Managed Access (UMA)

    Getting started with User Managed Access (UMA)

    • by Theviyanthan Krishnamohan
    • Posted on October 8, 2019October 8, 2019
    • in Mansplainings
    • Leave a comment on Getting started with User Managed Access (UMA)

    User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their resources by third parties. To understand how User Managed Access works, it is paramount that…

    Read More

  • Understanding OpenID Connect (OIDC)

    Understanding OpenID Connect (OIDC)

    • by Theviyanthan Krishnamohan
    • Posted on October 8, 2019October 11, 2019
    • in Mansplainings
    • 3 Comments on Understanding OpenID Connect (OIDC)

    OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On. …

    Read More

  • What is OAuth 2.0? How does it work?

    What is OAuth 2.0? How does it work?

    • by Theviyanthan Krishnamohan
    • Posted on October 5, 2019November 22, 2019
    • in Mansplainings
    • Leave a comment on What is OAuth 2.0? How does it work?

    A primer on OAuth 2.0 for dummies by a dummy.…

    Read More

  • Managing state in Flutter using Redux

    Managing state in Flutter using Redux

    • by Theviyanthan Krishnamohan
    • Posted on September 30, 2019October 5, 2019
    • in Tech Journal
    • Leave a comment on Managing state in Flutter using Redux

    This tutorial explains in detail how Redux can be integrated into your Flutter app to help manage the state of your Flutter app. …

    Read More

Posts navigation

«Previous Posts 1 2 3 4 5 … 11 Next Posts»
Copyright © 2023 Theviyanthan K. All rights reserved.