Passkeys (Passwordless) implementation using AWS Cognito

The digital identity used to securely access data or applications is constantly challenged by threat actors. They aim to steal information and cause harm to individuals' lives and businesses. We see solutions getting improved to securely access applications. It is important to enhance the security and also simplify the user experience. FIDO was founded to … Continue reading Passkeys (Passwordless) implementation using AWS Cognito

The Automated Home Kitchen: The Future of Homegrown Cooking Ingredients

Most of us might already be familiar with the MCP (Model Context Protocol) and A2A (Agent-to-Agent) protocols presented by Anthropic and Google to standardize how agents communicate and work together to solve problems. Since many have focused on discussing the protocols themselves, exploring how they can complement each other to solve complex problems, I wanted … Continue reading The Automated Home Kitchen: The Future of Homegrown Cooking Ingredients

Tesla Developer API Guide: HTTP-Proxy Server Integration (Part 4)

Tesla made the Vehicle commands API publicly accessible during the October time frame of 2023. During the initial launch, these APIs can be directly consumed with just the oAuth tokens to pass the commands to the vehicles. Later in a month, Tesla announced that the APIs would be deprecated in favor of the vehicle command … Continue reading Tesla Developer API Guide: HTTP-Proxy Server Integration (Part 4)

Tesla Developer API Guide: BLE Key Pair – Auth and Vehicle Commands (Part 3)

Tesla provides 2 ways of communication with the car. One is over the internet using the APIs and the other is using a BLE connection. BLE connection helps in one of the most crucial parts of locking and unlocking the car, even without having a network connection in the car and on the phone or … Continue reading Tesla Developer API Guide: BLE Key Pair – Auth and Vehicle Commands (Part 3)

The Emergence of Intelligent Mobile Apps

While smartphones represent the most convenient way for businesses to engage their customers, the emergence of IoT is expected to usher in a new generation of devices, ending the reign of smartphones. As mobile apps are no longer made just for smartphones, we believe the key shifts in mobility will center on how we interact … Continue reading The Emergence of Intelligent Mobile Apps

Implicit requirements in a mobile application development

It's been almost a decade that smartphones were introduced. When the smartphones were launched 10 years before there were not many capabilities except for making voice calls, limited browsing, taking decent photos, listen to stored music, etc. However, as years passed, the capabilities of smartphones have increased by multiple folds. Mobility and mobile app development … Continue reading Implicit requirements in a mobile application development

Intelligent Elegant Mobile Solutions

Mobile applications are getting smarter every day. These smartness are result of the actions that are taken based on the information collected from the user. Actions of the user on the mobile application are gathered as data and sent to server. The analytical engine then decides what action to perform to more engage the user … Continue reading Intelligent Elegant Mobile Solutions