Blog

This blog is intended for software system engineers, architects and managers or people generally interested in development, testing and integration of software systems. It is part of profiq’s community effort that has the objective of sharing knowledge and ideas about software system integration, testing and development. In addition to this technical content, we share updates about life at profiq.

Integrate and setup Split.io in under 15 minutes

Posted 8 months ago by Petr Večeřa

In the last blog post, I provided an overview of the Split Feature Experimentation Platform. In this post, I will show you how long it takes to integrate Split into the React web application. The best way to start the integration is by taking a look at their well-written documentation. You can also check out […]

Read article

Real-time control of your app features with Split

Posted 8 months ago by Petr Večeřa

At profiq, we often research and demo new and interesting modern technologies. One interesting Silicon Valley startup called Split (http://www.split.io) caught our attention with its recent launch of the Feature Experimentation Platform. The Feature Experimentation Platform is intriguing because it lets developers rapidly iterate product features, target them to customers, and measure their impact in […]

Read article

Certificate based authentication with OpenAM 10 and Tomcat 7

Posted 6 years ago by Nemanja Lukic

Although my use case for certificate based authentication is pretty basic, the existing documentation for Access Manager/OpenSSO/OpenAM is somewhat scarce and requires gathering information from various, often unrelated sources. For that reason, I have summarised the process in this article.

Read article

How to deploy OpenAM with DAUI using SSL

Posted 7 years ago by skatuscak

In my previous article “How to deploy OpenAM with DAUI”  I wrote down steps how to install complete architecture where DAUI is configured with OpenAM. To keep it simple, I used only plain non-encrypted communication between individual components, however in the real world, many deployments require some more security and encrypted cryptography is a basic requirement. […]

Read article

Contact us now

Your message has been sent. Thank you!