José da Cruz
IT Architect: a blog about the daily life of

  • Architecture Style Pattern

    What is an Architecture Style Architecture Style is the same as an Architecture Pattern. It is giving a name to the way the components and its relations are connected.

  • IAST

    IAST – Interactive Application Security Testing identifies security vulnerabilities in application code while it’s running.

  • Dynamic Application Security Testing (DAST)

    Dynamic Application Security Testing (DAST) is a testing process to assess an application’s security weaknesses and vulnerabilities.

  • SAST

    Static Application Security Testing (SAST) is a method used to review the source code of an application to identify potential vulnerabilities.

  • BASE

    BASE Transactions is a transaction model often used on databases that rely heavily on horizontal scaling and performance.

  • ACID

    ACID is an acronym used in databases to describe the properties associated with the input-output operations on the data.

  • Coarse-grained vs. Fine-grained

    Coarse-grained vs. fine-grained In computing, these concepts refer to the level of detail at which a system, configurations, security management, and others are broken down into smaller parts. Fine-grained: It refers to smaller parts of a system, such as files, columns, rows, methods, and attributes of a class. For instance, authorization configuration can refer to…

  • RAG

    RAG – Retrieval Augmentation Generation is a combination of Retrieval Augmentation and Generation to improve natural language processing tasks.

  • ABAC – Attribute Based Access Control

    ABAC – Attribute Based Access Control is a type of access control model that uses attributes to determine whether a user should be granted access to a resource.

  • RBAC – Role Based Access Control

    RBAC – Role Based Access Control is a security model to control access to resources based on the roles of individuals.