SWCODE BLOG
Articles from our daily dev work
Future-Proofing Authorization: Leveraging OpenFGA for Enhanced Security and Scalability
Imagine you’re an early explorer in the age of discovery, charting unknown territories where the maps of old don’t suffice. You set sail with one set of maps, only to discover they’re inadequate for navigating the new landscapes you encounter. Like these intrepid explorers, we too embarked on our technological...
Breaking Free: How Virtual Threads Transform Blocking Code into Non-Blocking Magic
You’re driving through a busy city intersection at rush hour. Cars are inching forward, everyone trying to get to their destination. But then, it happens—one car gets stuck, blocking another, which in turn blocks another. Before you know it, the entire intersection is gridlocked, and no one can move. You’re...
Mastering Data Consistency: A Deep Dive into the Transactional Outbox Pattern
Unlock the potential of modern distributed systems with our latest exploration: The Transactional Outbox Pattern. Discover how this pattern enhances data consistency, reliability, and system resilience in microservices architectures.
Google's Zanzibar and Beyond: A Deep Dive into Relation-based Authorization
Dive into the world of online permissions and it quickly becomes clear: it’s all about the connections you hold. Imagine being at an upscale gala. It’s not just about your invitation card that gets you through the door. It’s about who you know inside, the conversations you’re a part of,...
Requirements for a scalable Authorization Architecture
Our prior exploration, Authorization Basics of our Scaling Authz blog series, provided a primer on the foundational elements of authorization. Yet as organizations evolve, so too must the systems that safeguard their data and resources. This article delves deeper, defining essential criteria for an adaptive authorization system and starting our...
Authorization Basics
Welcome back to our Scaling Authz blog series, where we’re documenting our journey toward a scalable and efficient authorization architecture.
Scaling Authz: A Journey into Authorization Architectures
Welcome to “Scaling Authz,” a new series dedicated to exploring the complexities and challenges of implementing scalable authorization architectures, especially within the context of microservice environments. In this series, we will delve into the nuances of authorization, various approaches to solve common problems, and the techniques used by industry leaders...