Hi all! I am back with my last and final part of the BDT trilogy. And as mentioned, this last part will be super short and will have no connection with BDT. If you can recall during the first part of this series, I told you that I mix Cucumber-Junit…

In today’s world every system we interact with, we need to identify ourselves. And How do we identify? Using id and passwords. This is a very effective solution but has its own caveats. First of all, passwords can be easily brute-forced using dictionary attacks. To circumvent this, we need to…

Not so long back I was working on a project where we got complaints from the client that the infrastructure monthly cost is too high and they asked us to see if there is anything that we can do to reduce it.

On inspection of the monthly billing we found…

Hi all. Not long ago, I wrote an article on Flowable — Overcoming Common Hurdles in Flowable. Since then, I have been using Flowable often.

In my current project, we are using an event-driven architecture orchestrated by Apache Kafka. …

Hi all! As promised, I am back with a follow-up post. This time, it’s mostly for developers who want to understand how to implement BDT in their Spring Boot Applications.

Let’s do it step by step.

Step I — By defining my acceptance criteria, I make sure I always have…

Hi there! I thought of sharing my approach on testing CRUD applications. First, a little introduction about myself — I am a senior engineer working on backend system design and the architecture of web applications. When I first started working, I understood one thing very quickly, that a robust, resilient…

Today, when we interact with someone, be it an individual or an entity, can we be really sure he, she or it is whom they are claiming to be? Anyone can create and fake a social media profile in an instant, while a hacker can easily develop a malicious website…

Not very long ago, I was working on a Spring Boot project, where we were automating an insurance claims submission process. The client had given certain non-functional requirements for retrying certain tasks and recovery scenarios. To visualise the whole story, I drew the business flow using BPMN notation on a…

sukalpo mitra

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store