onkark.hashnode.devToken Based Auth System [state-less]In a token-based system, HS256 and RS256 are the two most common algorithms used to sign the token. 1. HS256 This method is mostly used in monolith application, where it only requires single key. 3d ago·2 min read
onkark.hashnode.devSession Based Auth System [state-full]Session based auth is traditional method of auth and it is state-full means we store sessions of user in memory or DB and share session_id to user to verity his identity This method is gold standard 4d ago·2 min read
onkark.hashnode.devQuery Translation (Query Decomposition) [Code Explanation]This articles demonstrates two advanced Query Decomposition techniques—Parallel and Iterative decomposition—used to improve document retrieval in a RAG pipeline using LangChain and Google Generative AI. if u don’t know about Query Decomposition visit...Oct 7, 2025·7 min read
onkark.hashnode.devQuery Translation (Query Re-writing) [Code Explanation]This articles demonstrates three advanced Query Transformation techniques—Multi-Query, RAG Fusion, and HyDE—used to improve document retrieval in a RAG pipeline using LangChain and Google Generative AI. if u don’t know about Query Re-writing visit ou...Oct 1, 2025·5 min read
onkark.hashnode.devQuery Translation (Query Decomposition) [Advance RAG]if you don’t or less knowledge about RAG, check it out blog first - link unless you can’t get topic What is Query Decomposition Query decomposition is advance RAG techniques used to breaking down complex problem into multiples sub-problems, basicall...Sep 26, 2025·5 min read