OKTA Authorization Using Microsoft Active Directory by Yuxin Wang

In recent years, OKTA has been very popular as a preferred solution for integrating security into web applications. A notable observation is the abundance of code examples available online for authentication purposes, whereas resources for authorization are comparatively scarce. In this article, I aim to outline the steps involved in utilizing OKTA's Active Directory integration specifically for authorization purposes.

Read More
Will AI Replace Coders? by Ed Lyons

Just about every programmer has given Generative AI a try in their development environment by this point, whether out of curiosity or fear. The hype around this technology is shouting at us everywhere. “BEWARE CODERS! You will be replaced by AI (you may escape if you subscribe to my paid newsletter.)”

Read More
Ed Lyons
Tactical Documentation During Modernization by Ed Lyons

A modernization project needs lots of new documentation to keep everyone working productively and with good velocity. It will not be the same as the documentation that is there for existing systems. But if it can be done quickly, iteratively, and with purpose, the effort is far more likely to achieve its goals.

Read More
Ed Lyons
Containerization: A Key Strategy for Business Agility by Jim Wilcox

Adopting containerization is a key strategy for supporting business agility. Containerization will enable your organization to accelerate its software development and delivery, empower its developers, enhance security, and reduce costs. Containerization will also prepare your team for the future, as it will facilitate migration to the cloud and reduce friction in adoption of new technologies and innovations.

Read More
Jim Wilcox