Posts

Understanding Hashing Algorithms: A Beginner’s Guide

Image
Introduction A hashing algorithm is a mathematical function that takes an input (like a piece of text or a file) and converts it into a fixed-length string of characters, usually numbers or letters. This string called a “hash,” is like a unique fingerprint for the input. Hashing algorithms are designed to be fast and produce unique hashes for different inputs. They are used in various… View On WordPress https://64.media.tumblr.com/6b981fbd1799c20ce2b082b36d786e2a/02090b0870b8ab29-98/s640x960/4ba2305addf84080479428877757cb4c9182fc2d.jpg https://guptadeepakcom.tumblr.com/post/713321869394231296

2021-2022: How LoginRadius’s DevOps Delivered Beyond Expectations?

Image
In the last couple of years, we re-engineered our CIAM platform to consistently deliver enterprise-grade scalability, throughput, availability, and stability. This was much needed as some of our largest customers have been serving massive user bases for whom seamless and responsive experiences were paramount. In this transition, the DevOps team has pushed boundaries to improve the infrastructure,… View On WordPress https://64.media.tumblr.com/7a3f9c032c3d08faad743310312b2f3e/6ba7eb691d948d6e-8e/s640x960/d53ad8e7584237882712dfb2df0a0e595d292402.png https://guptadeepakcom.tumblr.com/post/711327469049905152

BYOI: Empowering Individuals to Take Control of Their Digital Identities

Image
In today's digital world, our digital identities are becoming increasingly important. We use them to access services, purchase goods, and interact with others. However, many of us are unaware of the risks associated with our digital identities and how to protect them. This is where Bring Your Own Identity (BYOI) comes in. BYOI is a concept that empowers individuals to take control of their… View On WordPress https://64.media.tumblr.com/6c2b5b4b30cda4e3fa320dfd1c717e89/451ad0a547751758-93/s640x960/2cc44b06f9b1e0a7719feaa1f92c618482b0caf6.png https://guptadeepakcom.tumblr.com/post/711085562043547648

2022: A Year of Significant QA Transformation at LoginRadius

Image
In 2022 alone, LoginRadius CIAM platform has undergone major changes as we focused on re-engineering our platform to deliver cutting-edge performance, scalability, and throughput — which we needed to deliver for our customers who had large bases of end users for whom seamless experiences supported by lightning performance was mostly non-negotiable. The changes and upgrades in 2022 were needed due… View On WordPress https://64.media.tumblr.com/cc3dff5d1af8fb09f6987b5b28a267ba/a780b47394c8f393-1c/s640x960/571058e455a4a2ead6133734ccd44f1480f9d8db.png https://guptadeepakcom.tumblr.com/post/710062334255742976

Can AI Write an Emotional Poem or Song?

Image
The question of whether Artificial Intelligence (AI) can write an emotional poem or song is a complex one. AI has become increasingly influential in recent years and can perform various tasks, but can it create something as complex and personal as a poem or song? AI can certainly create lyrics and musical notes that fit together to create something resembling a song, but can it create something… View On WordPress https://64.media.tumblr.com/7e1a112e88bda30f6196a6d2795ae759/a3c6862afede7728-c0/s640x960/d524047c29d32a055f7a4f53c36f6febf3b290be.jpg https://guptadeepakcom.tumblr.com/post/709797108099710976

2022 - An Year of Engineering Resilience at LoginRadius

Image
Back in 2018, our product, engineering, infrastructure, and customer teams were a happy bunch — the LoginRadius CIAM platform has evolved a lot in the previous years. It is ready to scale, serve, and support the needs of some of the biggest retail and consumer-facing brands in the world. From 2019, the strength and capabilities of the CIAM platform enabled us to onboard some of the biggest brands… View On WordPress https://64.media.tumblr.com/56c3a07344edcc0b5b69f50130f6a43e/935e337cf98f1380-5d/s640x960/149b4cc2bb5808cfef3319dd98a30d3efc6853c2.png https://guptadeepakcom.tumblr.com/post/708792684678135808

Minimizing Credential Theft With MFA

Image
Organizations considering digital transformation must consider cybersecurity best practices, including phishing-resistant MFA features, to reinforce their cybersecurity posture. Phishing is one of the most common cybersecurity threats that cause brands to lose millions of dollars yearly and cause damage to business’ reputations. Regular cybersecurity awareness training and leveraging multifactor… View On WordPress https://64.media.tumblr.com/5b68c57a8b95717c599333f31b4d60e7/984872fd6fe75df2-3e/s640x960/1c07d19fbaeb006cafb5b6a4f0f608165a704e45.jpg https://guptadeepakcom.tumblr.com/post/707305728687374336