How make backend services invisible to outer world
When being passive is not always enough
How we started with Extensions 2.0: what is so cool about it and what are the limits
Is it 100% out-of-the-box or quite contrary - difficult to implement?
Retrsospective of our experiences with AWS Cognito in a real customer project.
This post is a follow-up to the previous `Securing Microservices with JWT Tokens`
Example of design patterns in Microsoft Dynamics NAV
What it takes to implement customer's idea into production just in 37 minutes
Learn how to use the new CSS property in a real-life usage scenario
Using JWT tokens to authenticate and authorize users in Microservice architecture
Getting started with Continous Delivery pipelines using GitHub and Jenkins 2.0