Posts

Showing posts from July, 2017

CAP

C- Consistency A- Availability P- Partition Tolerance It should satisfy the 2 among 3 properties,Not possible to fulfill all the properties CA-System always there with consistent Data Ex: RDBMS AP- System is available But data may not accurate  Ex: DynamoDB CP - Consistent but not available Ex: Mongo DB  

NOSQL

NOSQL - Not SQL Data Base , It used to store the Structure /Non Structure Data which is log/avi/twits/Blogs and etc. In generally prefer the NOSQL in the following 1) Better Performance 2) Horizontal Scalablity 3) HA Category : 1) Key Value - DynamoDB 2) Document - MongoDB 3) Column Based -HBASE Not exists in NOSQL : 1) No Join 2) No Constrain 3) No Complex Transaction

SQL VS NOSQL

SQL No SQL Data is in Structured Format Accept both Define Schema Dynamic Schema For Transactional Data Not for Trasactional Data Based ACID Property BASED on BASE propoerty and supports CAP Scaled Vertically Scaled Horizandally Supports complex Queries Does not support the Complex Query Based on table based DB Based on Document/Graph/Key Value /Column based Its either Open Source/ Vendors specific Mostly Open Source

Usecases for NOSQL in Teleom

NOSQL is used for following usecases 1) Profile Management 2) Customer 360 Degree View 3) Content Management 4) Product Catalog 5) Digital Communication 6) Real Time Operational Data 7) Fraud Detection 8) IOT Things 9) Pesonlization  

Security Implementation in RESTful

Security Implementation in RESTful Web Service : We can implement the Security in various in Web Service Context  . Authentication and Authorization are the Key Factors for Security. Authentication mainly used to check the user credential  to make that user are authenticated and Authorization to make sure whether user has the access for those resource . Both are managed by Active directory access through LDAP . Implementing the Security in RESTful in following ways 1)       Basic Authentication 2)       Digest Authentication 3)       CERT Authentication 4)       App key Authentication 5)       O Auth2.0 6)       Algorithm to generate the Passwords Basic Authentication : Authenticated the User Credential (User name and Password) pass as the plain text and it will validate against the Active Direc...