Skip to main content
Contact our team to know more about our services
select webform
By submitting, you acknowledge that you've read and agree to our privacy policies, and Opcito may use the information provided for business purposes.
Become a part of our team
select webform
One file only.
1.5 GB limit.
Allowed types: gif, jpg, jpeg, png, bmp, eps, tif, pict, psd, txt, rtf, html, odf, pdf, doc, docx, ppt, pptx, xls, xlsx, xml, avi, mov, mp3, mp4, ogg, wav, bz2, dmg, gz, jar, rar, sit, svg, tar, zip.
By submitting, you acknowledge that you've read and agree to our privacy policies, and Opcito may use the information provided for business purposes.

Accelerated data exchange and authentication using ReactJS and JWT

Accelerated data exchange and authentication using ReactJS and JWT

See how Opcito accelerated data exchange and authentication using ReactJS and JWT

Engagement details

A two-part product with a UI part that uses Rails, a server-side web application framework written in Ruby, communicates with the API side through a communication layer and uses a basic authentication system layer with an additional layer for security. The existing system with the additional checks resulted in increased time to process the request by end-user through the API as the requests and responses had to pass through the additional checks, and the Ruby interface was slowing the performance.

Technologies

  • React JS
  • JWT
  • Ruby on Rails

Benefits

  • Reduced response time
  • Improved user experience
  • Enhanced security with JWT framework

Subscribe to our feed

select webform

From the CEO’s Desk: Deciphering containerd

Deciphering containerd

Ever since the ascent of containers, Docker has been valued as the most preferred container management tool. But as the technology evolved, the industry players realized that there was a need for customization in the Docker architecture to allow vendors to build things their way. The Docker team has been constantly trying to evolve its offerings to make the platform more composable so that individual components can be spun off and used by other vendors developing alternative solutions.

How to make your application highly scalable and highly available with Corosync and DRBD file sync?

High-Availability Cluster is a group of computers with the purpose of increasing the uptime of services by making sure that a failed machine is automatically and quickly replaced by a different machine with little service disruption.

In this blog, I will explain how you can set up a Jenkins High Availability (HA) cluster using the data replication software DRBD and the cluster manager Heartbeat. In this example, the two machines building the cluster run on Ubuntu 16.04. I will also talk about how to switch between the active and passive machines in case of failover.

Microservices simplified with NGINX app server platform

Microservices simplified with NGINX app server platform

NGINX, a project started in 2002, is now a company widely appreciated for its open-source web-server platform which is rivaling the likes of Apache and Microsoft. With its position firm in the web-server space and an ever-increasing market share, NGINX is now coming up with an arsenal of enhancements to bolster its application platform technology. A lot of us are moving from monolith to microservices, and NGINX is always encouraging organizations the adoption of microservices architecture.

Most feature-rich release by Kubernetes - 1.10

Most feature-rich release by Kubernetes - 1.10

Kubernetes 1.10 is here! This is the first major release of 2018 for Kubernetes, which is fast becoming the largest and fastest-growing container orchestration platform. A beta version released on 2nd March provided us a taste of what was coming in the subsequent stable release on 26th March. The emphasis of this release is addressing problems in the key areas- storage, security, and networking plus key features such as the Container Storage Interface (CSI), API aggregation, and added support for hardware devices.

From the CEO’s Desk: Implementing secure DevOps to innovate with confidence

Implementing secure DevOps to innovate with confidence

Security was one of the most talked about terms in 2017, and some of the events such as Equifax, WannaCry, Bad Rabbit, and the Yahoo Bombshell of 2013 exposed the vulnerability of the current IT systems in place. Although most of these events were planned attacks rather than accidents, failure of the security measures taken resulted in the leaking data of millions of individuals and affecting companies with millions of dollars.

From the CEO’s Desk: Operationalize your SaaS the right way

Operationalize your SaaS the right way

Although the term was introduced at the start of the 20th century, the SaaS market is older than we think. Application as a service, as some of us used to call it, can be dated back to the 1960s, to the times of utility computing. Some of the old-school examples include emails and other messaging services, online office tools, customer management software such as CRMs, ERPs, accounting applications, etc. And now, the popular ones include Zendesk, Office365, Salesforce, Google Apps, Dropbox, Slack, etc.