For over 5+ years we help companies reach their financial and branding goals. oDesk Software Co., Ltd is a values-driven technology agency dedicated

Gallery

Contacts

Address

108 Tran Dinh Xu, Nguyen Cu Trinh Ward, District 1, Ho Chi Minh City, Vietnam

E-Mail Address

info@odesk.me

Phone

(+84) 28 3636 7951

Hotline

(+84) 76 899 4959

Websites Development

Announcing ClusterControl 1.7.6: HA Stack Deployments in the Cloud with HAProxy

We’re excited to announce the 1.7.6 release of ClusterControl – the only database management system you’ll ever need to take control of your open source database infrastructure.  This new edition expands our commitment to cloud integration by allowing a user to deploy a SQL database stack to the cloud provider of your choice with the HAProxy load […]

Websites Management

Event-Driven Data Management for Microservices

Editor – This seven‑part series of articles is now complete: Introduction to Microservices Building Microservices: Using an API Gateway Building Microservices: Inter‑Process Communication in a Microservices Architecture Service Discovery in a Microservices Architecture Event‑Driven Data Management for Microservices (this article) Choosing a Microservices Deployment Strategy Refactoring a Monolith into Microservices (this article) You can also download […]

Websites Management

The Difference Between HTTP Auth, API Keys, and OAuth

When designing systems that enable secure authentication and authorization for API access, you must consider how your applications and users should authenticate themselves. In this article, we’ll compare three different ways to achieve this: API Keys, HTTP Basic Authentication, and OAuth. We’ll also highlight what the benefits and drawbacks are for each method. API Keys Using API keys […]

Websites Management

What is the Difference Between Authentication and Authorization?

Authorization and authentication are often considered interchangeable. However, these systems do doing vastly different things. Understanding the differences between them is incredibly crucial for adequate security implementation. Authentication = Who are you? Authentication is essentially the practice of proving that you are who you say you are. Trust is hard to come by in any system. […]