@Ishaq24000
Software Engineer
Nothing here yet.
Nothing here yet.
Apr 26 · 20 min read · Every production system eventually faces the same question: "Why did that fail at 3 AM?" The answer lives in your logs — if you designed your logging system well enough to find it. This post is a tho
Join discussionJun 29, 2025 · 7 min read · In many corporate or secure environments, there's a common challenge: public-facing domains, including Google Drive, are often blocked for security reasons. This poses a significant problem if your team relies heavily on Google Drive for resources. W...
Join discussionJun 20, 2025 · 7 min read · Authentication Tells you who the user is. It’s all about verifying identity. Authorization Tells you what that user is allowed to do. It’s about checking if the client has permission to access a specific resource. Basic Auth with Access Tokens Here’...
Join discussion