<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: theepankaja</title>
    <description>The latest articles on Forem by theepankaja (@theepankaja).</description>
    <link>https://forem.com/theepankaja</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1365894%2F210e1064-4b34-42b3-b3c3-b5908c77a178.png</url>
      <title>Forem: theepankaja</title>
      <link>https://forem.com/theepankaja</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/theepankaja"/>
    <language>en</language>
    <item>
      <title>Shadcn UI: A Developer's Delight (My Experience)</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Thu, 02 May 2024 18:50:48 +0000</pubDate>
      <link>https://forem.com/theepankaja/shadcn-ui-a-developers-delight-my-experience-37cj</link>
      <guid>https://forem.com/theepankaja/shadcn-ui-a-developers-delight-my-experience-37cj</guid>
      <description>&lt;p&gt;Let me start by admitting this: I'm always on the lookout for new UI libraries that can streamline my development process. Recently, I stumbled upon a gem called Shadcn UI, and let me tell you, it's been a game-changer.&lt;/p&gt;

&lt;p&gt;This wasn't just another "try it out" situation. I actually used Shadcn UI for a recent project, and it quickly became my go-to library. Here's why I was so impressed&lt;/p&gt;

&lt;h2&gt;
  
  
  Beautiful by Default
&lt;/h2&gt;

&lt;p&gt;Shadcn UI boasts a collection of pre-built components that are not only functional but also aesthetically pleasing. From buttons and forms to cards and modals, everything is designed with a modern and clean look. This saved me tons of time crafting UI elements from scratch, and the visual consistency across the components made my project look polished.&lt;/p&gt;

&lt;h2&gt;
  
  
  Easy to Use (Seriously)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa3mataitt80n3p4z0uw5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa3mataitt80n3p4z0uw5.png" alt="shadcn/UI" width="800" height="486"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the biggest things I look for in a UI library is ease of use. Shadcn UI delivers in spades.  The components are well-documented, and integrating them into my project was a breeze.  They even have a philosophy of "copy and paste" –  components are designed to be easily integrated with minimal fuss. This intuitive approach made development smooth and efficient.&lt;/p&gt;

&lt;h2&gt;
  
  
  Customization FTW
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4a1lcrv4wfktyvky1m4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4a1lcrv4wfktyvky1m4.png" alt="shadcn" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
Don't get me wrong, the default styles are great, but Shadcn UI understands that developers like a little control. The library offers a good range of customization options, allowing me to tweak the look and feel of the components to perfectly match my project's brand identity.&lt;/p&gt;

&lt;h2&gt;
  
  
  Open Source Goodness
&lt;/h2&gt;

&lt;p&gt;As an open-source enthusiast, I was happy to see that Shadcn UI is freely available. This not only makes it accessible but also fosters a strong community around the library. There's a wealth of resources available online, including tutorials and additional component collections built on top of Shadcn UI.&lt;/p&gt;

&lt;h2&gt;
  
  
  Beyond the Basics
&lt;/h2&gt;

&lt;p&gt;While Shadcn UI excels in providing pre-built components, it goes a step further.  The library offers tools like form builders and pricing page generators that streamline specific development tasks. These extras were a welcome surprise and definitely helped me accelerate development.&lt;/p&gt;

&lt;h2&gt;
  
  
  Overall Experience
&lt;/h2&gt;

&lt;p&gt;My experience with Shadcn UI has been fantastic. It's a well-designed, easy-to-use library that offers a great balance of beautiful aesthetics, customization options, and developer-friendly features. Whether you're a seasoned developer or just starting out, Shadcn UI is definitely worth checking out. It can save you time, improve your workflow, and help you build stunning UIs.&lt;/p&gt;

&lt;p&gt;You can access shadcn/UI using the following links.&lt;br&gt;
&lt;a href="https://ui.shadcn.com/"&gt;Official Site&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/shadcn-ui/ui"&gt;Github Repo&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Have you tried Shadcn UI? Share your thoughts in the comments below!&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>webdev</category>
      <category>javascript</category>
      <category>programming</category>
    </item>
    <item>
      <title>Building a Real-Time Messaging Platform with Kafka</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Tue, 09 Apr 2024 15:00:21 +0000</pubDate>
      <link>https://forem.com/theepankaja/building-a-real-time-messaging-platform-with-kafka-3klf</link>
      <guid>https://forem.com/theepankaja/building-a-real-time-messaging-platform-with-kafka-3klf</guid>
      <description>&lt;p&gt;As CTO, ensuring seamless communication and real-time data flow is crucial for any successful platform. In the fast-paced world of cryptocurrency, where market movements happen in milliseconds, this need is even more critical. At our Crypto App, we faced this challenge head-on by building a robust real-time messaging platform using Apache Kafka.&lt;/p&gt;

&lt;p&gt;This blog post takes you on a journey, from the architectural considerations to team management, as we delve into the world of Kafka and its advantages over traditional messaging systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Challenge: Taming the Data Deluge
&lt;/h2&gt;

&lt;p&gt;In our Crypto App's early days, we relied on traditional message queuing systems like RabbitMQ. While it served us well initially, the ever-increasing volume and velocity of crypto data soon exposed its limitations. Scalability became a concern, and latency, even a slight delay in price updates, could have a significant impact on user experience.&lt;/p&gt;

&lt;p&gt;We needed a solution that could handle the high throughput and real-time demands of our platform.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbx457rycrs88p7nw3b9c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbx457rycrs88p7nw3b9c.png" alt="Kafka architecture " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Enter Kafka: The Distributed Stream Processor
&lt;/h2&gt;

&lt;p&gt;Kafka emerged as the ideal solution. Unlike RabbitMQ, which operates as a message broker, Kafka is a distributed streaming platform. It excels at ingesting, storing, and processing high-volume data streams in real-time. This fundamental difference translates to several key benefits:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Scalability:&lt;/strong&gt; Kafka can easily scale horizontally by adding more nodes to the cluster, allowing us to handle the ever-growing data volume of the crypto market.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Durability:&lt;/strong&gt; Data is replicated across multiple nodes, ensuring high availability and preventing data loss in case of hardware failures.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Low Latency:&lt;/strong&gt; Kafka's architecture minimizes processing delays, enabling us to deliver real-time crypto price updates to users with minimal lag.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Decoupling:&lt;/strong&gt; Producers and consumers of data operate independently, facilitating a more loosely coupled architecture and improved development agility.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Beyond Kafka: The Power of gRPC
&lt;/h2&gt;

&lt;p&gt;While Kafka forms the backbone of our real-time messaging infrastructure, gRPC (Remote Procedure Calls) plays a crucial role in efficiently utilizing message streams. gRPC offers several advantages over traditional REST APIs for real-time applications:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5abxjp8e2m3h4lzlq5n.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5abxjp8e2m3h4lzlq5n.jpg" alt="gRPC VS Rest" width="800" height="519"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Performance:&lt;/strong&gt; gRPC uses a binary protocol for communication, leading to faster and more efficient data transfer compared to JSON-based APIs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bidirectional Streaming:&lt;/strong&gt; Unlike REST, which is primarily request-response based, gRPC enables bidirectional streaming, allowing real-time data exchange between servers and clients.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Building a Winning Team: Communication and Collaboration
&lt;/h2&gt;

&lt;p&gt;The success of our Crypto App hinged on building a team well-versed in these technologies. We adopted a multi-pronged approach:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Technical Training:&lt;/strong&gt; We invested in training our developers on Kafka and gRPC, ensuring they understand not just the how, but also the why behind our technology choices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Knowledge Sharing:&lt;/strong&gt; We fostered a culture of knowledge sharing within the team through brown bag sessions and code reviews, maximizing learning opportunities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Clear Documentation:&lt;/strong&gt; We created comprehensive internal documentation on the architecture and usage of Kafka and gRPC, serving as a reference point for developers and future team members.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Road to Success: Lessons Learned
&lt;/h2&gt;

&lt;p&gt;The journey of building our Crypto App using Kafka and gRPC has been rewarding. Here are some key takeaways:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Choosing the Right Tools:&lt;/strong&gt; Evaluating your application's specific needs is crucial. While Kafka proved superior for our Crypto App, other real-time communication platforms like Apache Pulsar or Amazon Kinesis might be better suited for different use cases.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Embrace Open Source:&lt;/strong&gt; Open-source technologies like Kafka and gRPC offer flexibility and a vast community for support.&lt;/li&gt;
&lt;li&gt;Invest in Your Team: Empower your developers with the knowledge and skills required to leverage these technologies effectively.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By embracing real-time messaging with Kafka and gRPC, our Crypto App has delivered a platform that keeps users informed and engaged, solidifying our position in the dynamic world of cryptocurrency.&lt;/p&gt;

</description>
      <category>kafka</category>
      <category>realtime</category>
      <category>webdev</category>
      <category>cto</category>
    </item>
    <item>
      <title>The Case of the Disappearing OTPs: Exposing SMS Pumping Attacks</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Tue, 02 Apr 2024 19:45:10 +0000</pubDate>
      <link>https://forem.com/theepankaja/the-case-of-the-disappearing-otps-exposing-sms-pumping-attacks-9jl</link>
      <guid>https://forem.com/theepankaja/the-case-of-the-disappearing-otps-exposing-sms-pumping-attacks-9jl</guid>
      <description>&lt;p&gt;Imagine this: you've integrated a robust 2-step verification (2FA) system using Twilio for OTP delivery, feeling confident about your user security. But then, a wave of confusion hits your team. OTP codes are flying out, yet your backend logs show no record of user requests. Panic sets in – is it a security breach? An internal threat?&lt;/p&gt;

&lt;p&gt;This scenario, though unsettling, might be a case of a sneaky cybercrime tactic known as SMS pumping.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SMS Pumping?
&lt;/h2&gt;

&lt;p&gt;SMS pumping, also called SMS traffic pumping or International Revenue Share Fraud (IRSF), exploits weaknesses in systems that rely on SMS verification. Attackers use bots to bombard your platform with fake requests for OTP codes. These codes are then sent to phone numbers controlled by the attackers, who often profit through revenue-sharing agreements with certain mobile carriers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Our Story: A Baffling Mystery
&lt;/h2&gt;

&lt;p&gt;In our project, everything seemed secure. We had 2FA with Twilio, and Cloudflare guarded our systems against bots. Even Postman, our API testing tool, was locked down. Yet, the inexplicable OTP storm raged on. Internal investigations yielded no culprits.&lt;/p&gt;

&lt;h2&gt;
  
  
  Unmasking the Culprit: The Signs of SMS Pumping
&lt;/h2&gt;

&lt;p&gt;The key to identifying SMS pumping lies in the red flags:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Spike in OTP requests: A sudden, dramatic increase in OTP requests, often originating from sequential phone numbers controlled by the same carrier.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Missing backend logs: No corresponding user activity on your platform for the OTP requests.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Incomplete verification cycles: If the OTPs are intended for user verification, you won't see completed verification processes.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Fighting Back Against SMS Pumping
&lt;/h2&gt;

&lt;p&gt;Here's how to fortify your defenses:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Validate phone numbers: Implement checks to ensure phone numbers are valid and belong to real users.&lt;/li&gt;
&lt;li&gt;Rate limiting: Set limits on the number of OTP requests allowed per user or IP address.&lt;/li&gt;
&lt;li&gt;Advanced fraud detection: Consider solutions that analyze user behavior to identify suspicious activity.&lt;/li&gt;
&lt;li&gt;Partner with Twilio: Twilio offers fraud prevention tools to help combat SMS pumping.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Lessons Learned
&lt;/h2&gt;

&lt;p&gt;Our experience highlights the importance of staying vigilant against emerging cyber threats. By understanding the signs of SMS pumping and implementing robust security measures, you can protect your platform and user data.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Remember, security is an ongoing process. Stay informed and adapt your defenses to stay ahead of the game!&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>twilio</category>
      <category>sms</category>
      <category>webdev</category>
      <category>otp</category>
    </item>
    <item>
      <title>How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Thu, 28 Mar 2024 17:27:23 +0000</pubDate>
      <link>https://forem.com/theepankaja/how-zero-trust-empowers-secure-remote-teams-a-ctos-perspective-1d1g</link>
      <guid>https://forem.com/theepankaja/how-zero-trust-empowers-secure-remote-teams-a-ctos-perspective-1d1g</guid>
      <description>&lt;p&gt;As CTO of a company that thrives on a remote-first work model, I understand the beauty and the beast of managing geographically dispersed teams. We've harnessed the incredible benefits – a wider talent pool, happier employees, and reduced overhead – but also constantly grapple with the unique security challenges.&lt;/p&gt;

&lt;p&gt;Let me tell you a story that solidified the importance of robust security measures in our remote environment. We, like many companies, celebrate team wins with occasional gift card rewards. One morning, I received a frantic call from our Head of Development.  A senior backend developer, someone with over six years of experience, had been scammed.&lt;/p&gt;

&lt;p&gt;Here's what transpired. We'd sent out Starbucks gift cards as a token of appreciation, using the Starbucks online service. The next day, the developer received an email – a cleverly crafted scam –  purporting to be from the CEO. The email requested his personal phone number for an "urgent matter."  Trusting the sender (who appeared to be the CEO), the developer provided his number.  This, unfortunately, was the chink in the armor the scammers were looking for.  They then impersonated our CEO over the phone, convincing the developer to purchase additional gift cards – a total of $1500 worth –  promising reimbursement later. Needless to say, that reimbursement never came.&lt;/p&gt;

&lt;p&gt;This incident was a stark reminder that even seasoned developers are susceptible to social engineering tactics. It highlighted the importance of a security approach that assumes &lt;strong&gt;we trust the developers, but we don't trust the devices and the network they are using.&lt;/strong&gt; This is the core principle behind Zero Trust.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero Trust: My Remote Team Savior&lt;/strong&gt;&lt;br&gt;
After the gift card scam, I knew we needed a more comprehensive security solution for our remote workforce.  Enter Cloudflare Zero Trust.&lt;/p&gt;

&lt;p&gt;Here's how Cloudflare Zero Trust helped us achieve secure and seamless collaboration:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Granular Access, Not a Free-for-All:&lt;/strong&gt; Gone are the days of wide-open access to our development environments. With Cloudflare Zero Trust, I can define exactly which teams and users have access to specific environments. This minimizes potential damage in case of a security breach. For instance, our marketing team has no need to access our development servers – Cloudflare Zero Trust ensures they can't.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security Without the Fuss:&lt;/strong&gt; Let's face it, developers are a creative bunch, and we don't want to stifle their workflow with overly complex security measures. Thankfully, Cloudflare Zero Trust provides robust security without hindering usability. Our developers can access the resources they need, securely, from anywhere in the world.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fort Knox for Devices:&lt;/strong&gt; Cloudflare Zero Trust doesn't discriminate – it doesn't just focus on user access. It also ensures that only devices meeting pre-defined security standards can connect to our servers. Think of it as a digital moat around our critical infrastructure – only authorized users with authorized devices can get in.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Zero Trust Journey: A Few Tips
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flselbe4kkisk94onhbd7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flselbe4kkisk94onhbd7.jpg" alt="Cloudflare Zero Trust" width="800" height="492"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Having successfully implemented Zero Trust with Cloudflare, here are some insights I'd like to share:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Educate Your Team:&lt;/strong&gt; The best security system is only as effective as the users who interact with it. We invested in educating our team about Zero Trust principles and best practices. This empowers them to be active participants in our security posture.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Phased Implementation:&lt;/strong&gt; We didn't rip the band-aid off and implement Zero Trust overnight. We took a phased approach, allowing us to identify and iron out any wrinkles before full deployment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Find the Right Fit:&lt;/strong&gt; There are many Zero Trust solutions on the market. Do your research and select one that aligns with your specific needs and budget.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Remote Revolution, Secured
&lt;/h2&gt;

&lt;p&gt;By embracing Zero Trust with a solution like Cloudflare Zero Trust, organizations can unlock the full potential of remote teams. It fosters a secure environment where skilled developers, regardless of location, can collaborate effectively.  This translates to a happier, more productive workforce and a stronger competitive edge for your business.&lt;/p&gt;

&lt;p&gt;So, if you're managing a remote team and security is keeping you up at night,  consider Zero Trust. It might just be the game-changer you've been looking for.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;here's a breakdown of some popular free and paid Zero Trust solutions&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Free Tier Options:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Cloudflare Zero Trust:&lt;/strong&gt; While Cloudflare offers a free tier with basic functionalities, advanced features for granular access control and device posture checks likely require a paid plan. It's best to explore their pricing structure to see if it aligns with your needs &lt;a href="https://www.cloudflare.com/plans/zero-trust-services/"&gt;https://www.cloudflare.com/plans/zero-trust-services/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Twingate:&lt;/strong&gt; Twingate offers a free trial allowing you to test-drive their ZTNA solution. This can be a great way to see if it meets your basic requirements before committing to a paid plan &lt;a href="https://www.twingate.com/"&gt;https://www.twingate.com/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BetterCloud:&lt;/strong&gt; BetterCloud's free tier provides some core functionality for user access management, which can be a helpful starting point for smaller teams &lt;a href="https://www.bettercloud.com/"&gt;https://www.bettercloud.com/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Paid Solutions:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Perimeter 81:&lt;/strong&gt; Perimeter 81 offers a comprehensive Zero Trust platform with a variety of paid plans catering to different business needs &lt;a href="https://www.perimeter81.com/"&gt;https://www.perimeter81.com/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CrowdStrike Falcon Zero Trust:&lt;/strong&gt; CrowdStrike Falcon Zero Trust integrates access management with endpoint threat protection, offering a holistic security approach (pricing available upon request).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zscaler Private Access (ZPA):&lt;/strong&gt; Zscaler's ZPA is a well-established ZTNA solution with various paid plans depending on features and user count &lt;a href="https://www.zscaler.com/pricing-and-plans"&gt;https://www.zscaler.com/pricing-and-plans&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Azure Active Directory:&lt;/strong&gt; While not purely a Zero Trust solution, Azure AD offers features like multi-factor authentication and conditional access that contribute to a Zero Trust approach (pricing varies based on chosen services within Azure AD) &lt;a href="https://www.microsoft.com/en-us/security/business/microsoft-entra-pricing"&gt;https://www.microsoft.com/en-us/security/business/microsoft-entra-pricing&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>zerotrust</category>
      <category>cloudflare</category>
      <category>security</category>
      <category>remote</category>
    </item>
    <item>
      <title>AI is Not Going to Steal Your Keyboard (Unless You Let Them Write the Code)</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Tue, 26 Mar 2024 18:56:36 +0000</pubDate>
      <link>https://forem.com/theepankaja/ai-is-not-going-to-steal-your-keyboard-unless-you-let-them-write-the-code-44m0</link>
      <guid>https://forem.com/theepankaja/ai-is-not-going-to-steal-your-keyboard-unless-you-let-them-write-the-code-44m0</guid>
      <description>&lt;p&gt;&lt;strong&gt;Ah, the age-old fear: robots taking our jobs!&lt;/strong&gt;  While the Terminator movies might paint a picture of a future dominated by self-aware toasters, the reality of AI in the workplace is far more nuanced. Here's the truth bomb: AI isn't coming to steal your keyboard (well, maybe not literally). It's the person who snoozes on embracing AI who might be left behind.&lt;/p&gt;

&lt;p&gt;Think of AI as the ultimate power-up in the workplace video game. It can automate repetitive tasks, analyze mountains of data in seconds, and even generate creative content. But here's the catch: you need a player behind the controller to truly leverage its potential.&lt;/p&gt;

&lt;p&gt;Remember that scene in Hitchhiker's Guide to the Galaxy where Marvin the robot complains about having to fetch tea for people who can't even calculate the meaning of life?  Yeah, that's what AI can feel like in the wrong hands.  Just a glorified tea-fetching bot.&lt;/p&gt;

&lt;p&gt;The real magic happens when humans and AI become a dream team.  Imagine a data analyst who can use AI to sift through customer reviews in minutes, then use their human intuition to identify key trends. Or a creative writer who utilizes AI to brainstorm story ideas, then injects their own unique voice to craft a captivating narrative.&lt;/p&gt;

&lt;p&gt;Here's a real-world example: doctors are increasingly using AI to analyze medical scans and identify potential problems. But it's the doctor's expertise and experience that interprets the data and makes the final diagnosis. AI is the super-powered assistant, the doctor is still the hero.&lt;/p&gt;

&lt;p&gt;So, how do you avoid becoming the Marvin of your workplace? Here's the recipe for success:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Be an AI evangelist, not a skeptic.&lt;/strong&gt; Embrace the potential and learn how to use AI tools effectively.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Focus on your uniquely human skills.&lt;/strong&gt; Creativity, critical thinking, and emotional intelligence are irreplaceable assets in the age of AI.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Become an AI whisperer.&lt;/strong&gt; Learn how to communicate effectively with AI tools to get the most out of them.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The future of work isn't about humans vs. machines, it's about &lt;strong&gt;humans with machines&lt;/strong&gt;. So, grab your keyboard, fire up your favorite AI tool, and get ready to write the next chapter of your career. After all, the coolest stories are always the ones where the hero gets a powerful upgrade.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>webdev</category>
      <category>programming</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>From Concept to Reality: The Journey of Building a Mobile CV-Based Human Pose Detection App</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Wed, 20 Mar 2024 17:58:44 +0000</pubDate>
      <link>https://forem.com/theepankaja/from-concept-to-reality-the-journey-of-building-a-mobile-cv-based-human-pose-detection-app-4662</link>
      <guid>https://forem.com/theepankaja/from-concept-to-reality-the-journey-of-building-a-mobile-cv-based-human-pose-detection-app-4662</guid>
      <description>&lt;p&gt;In the dynamic landscape of tech innovation, the story of creating something truly groundbreaking often starts with a spark—an idea that challenges the status quo. My journey through developing a mobile CV-based Human Pose Detection app, designed to revolutionize exercise detection, is a tale of technology, teamwork, and transformation. As the CTO of a vibrant team of five developers, I led the architectural design and DevOps orchestration of a project that initially flirted with IoT concepts before embracing the transformative power of Computer Vision (CV) technology.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1k3h0tnz0bey2fyt5kv2.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1k3h0tnz0bey2fyt5kv2.jpeg" alt="FITFI Promo post" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Genesis: IoT and 9 DOF Sensors
&lt;/h2&gt;

&lt;p&gt;Our adventure began in 2019, with the ambition to merge the physical and digital worlds through the lens of IoT. We aimed to create a solution that could accurately detect and analyze human poses, catering especially to fitness enthusiasts who sought precision in their exercise routines. The prototype phase saw us designing and creating five iterations of a custom board, each embedded with a 9 Degree of Freedom (9 DOF) sensor. This sensor was pivotal in capturing motion data, a task that required us to dive deep into the realms of firmware development, ensuring our hardware could seamlessly communicate with the software we were envisioning.&lt;/p&gt;

&lt;h2&gt;
  
  
  Team Synergy: A Blend of Expertise
&lt;/h2&gt;

&lt;p&gt;The journey was not a solo endeavor; it was fueled by the collective expertise of a five-developer team, with roles spanning from data scientists to backend specialists. My role as CTO was to architect the application's backbone and spearhead our DevOps strategy, ensuring that our development lifecycle was as smooth and efficient as the exercises we aimed to track. Our backend, a robust infrastructure deployed on AWS Cloud utilizing Elastic Beanstalk and Serverless technologies, was the digital scaffolding that supported our ambitious project.&lt;/p&gt;

&lt;h2&gt;
  
  
  Shift in Paradigm: Embracing Computer Vision
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fervdxxjpval6mvbg46pf.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fervdxxjpval6mvbg46pf.jpeg" alt="FITFI Screenshot" width="422" height="750"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As our project evolved, so did our understanding of the best tools to achieve our goal. The initial IoT-centric approach, while innovative, led us to a pivotal realization—the future of human pose detection in our project lay in the power of Computer Vision. This epiphany prompted a strategic pivot to CV technology, leveraging TensorFlow Lite and TensorFlow Pose Estimation SDKs. This transition was not merely a change in technology but a leap towards creating a more scalable, efficient, and user-friendly solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Local Processing Revolution
&lt;/h2&gt;

&lt;p&gt;One of the groundbreaking aspects of our app was the ability to process sensor data locally on mobile devices. Our data scientist played a crucial role in this, receiving sensor data via Bluetooth and crunching numbers on the fly. This local processing not only enhanced performance but also laid the groundwork for our model to learn and improve over time. I took charge of creating a pipeline that facilitated this continuous improvement cycle, ensuring that our app became smarter and more accurate with each exercise it analyzed.&lt;/p&gt;

&lt;h2&gt;
  
  
  On-Device Magic: TensorFlow Lite and Pose Estimation
&lt;/h2&gt;

&lt;p&gt;The decision to incorporate TensorFlow Lite and TensorFlow Pose Estimation SDKs marked a significant milestone in our app's development. By running CV algorithms directly on the device, we unlocked real-time pose detection capabilities, enabling users to receive instant feedback on their exercise form. This on-device processing was not just a technical feat; it was a user experience revolution, ensuring that our app could operate seamlessly, even in the most bandwidth-constrained environments.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/T0QVdJ5brM8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h2&gt;
  
  
  Lessons Learned and Paths Forward
&lt;/h2&gt;

&lt;p&gt;The journey from an IoT-based concept to a CV-powered reality taught us invaluable lessons about innovation, flexibility, and the importance of staying ahead of the technological curve. As a CTO, guiding a team through this transformative process was both a challenge and a privilege. It reaffirmed my belief in the power of collaboration, the importance of a solid architectural foundation, and the need for a forward-thinking DevOps strategy.&lt;/p&gt;

&lt;p&gt;Creating the mobile CV-based Human Pose Detection app was a journey of technological evolution, driven by a vision to blend physical activity with digital precision. It was a testament to the power of innovation, the value of adaptable strategies, and the incredible potential of combining IoT with Computer Vision to create solutions that impact lives. As we look to the future, the lessons learned and the successes achieved fuel our passion for pushing the boundaries of what's possible, one pose at a time.&lt;/p&gt;

</description>
      <category>computervision</category>
      <category>tensorflow</category>
      <category>ios</category>
      <category>android</category>
    </item>
    <item>
      <title>Welcome to my Blog</title>
      <dc:creator>theepankaja</dc:creator>
      <pubDate>Wed, 20 Mar 2024 14:42:19 +0000</pubDate>
      <link>https://forem.com/theepankaja/welcome-to-my-blog-46po</link>
      <guid>https://forem.com/theepankaja/welcome-to-my-blog-46po</guid>
      <description>&lt;h3&gt;
  
  
  Here's to a journey of exploration, learning, and growth in the fascinating world of technology!
&lt;/h3&gt;

&lt;p&gt;Welcome to my blog! I'm excited to embark on this digital journey with you, sharing insights from my decade-long experience as a Chief Technology Officer. My career has been a blend of innovation, leadership, and a relentless pursuit of technological excellence. Today, I want to give you a glimpse into my world and what you can expect from this blog.&lt;/p&gt;

&lt;p&gt;Over the years, I've had the privilege of leading talented teams in developing large-scale Content Management, E-commerce, HRM, and CRM platforms. My journey started in the trenches of development and scaled up to strategic leadership in various startups and growth-stage companies. These experiences have not only shaped my understanding of technology but also honed my ability to thrive in dynamic and fluid environments.&lt;/p&gt;

&lt;p&gt;As we delve into the realms of cutting-edge technologies like Artificial Intelligence (AI), Large Language Models (LLM), and more, I'll share with you the insights and lessons I've learned along the way. The tech landscape is ever-evolving, and staying ahead of the curve requires both agility and foresight.&lt;/p&gt;

&lt;p&gt;My expertise lies in several key areas: Technology Architecture &amp;amp; Consulting, Cloud Computing, Cloud Application Architecture, and optimizing for Service Scalability &amp;amp; High-Performance Computing. Additionally, my background in Web-based programming languages has been instrumental in navigating the complex world of software development.&lt;/p&gt;

&lt;p&gt;Through this blog, I aim to demystify these technologies and provide practical insights into how they can be leveraged for business growth and innovation. Whether you're a budding tech enthusiast, a seasoned developer, or a business leader looking to understand the impact of technology on your operations, there's something here for you.&lt;/p&gt;

&lt;p&gt;I believe in the power of sharing knowledge and experiences, and I'm looking forward to engaging with you all. Stay tuned for posts on the latest trends in technology, deep dives into technical topics, and my personal reflections on leading tech teams and projects.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>cto</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
