Spring Security Implementation using JPA

In this article I’ll be showing you guys how to implement authentication and authorization using Spring Security and JPA. Authentication refers to the process of confirming identity and Authorization refers to the process of verifying what a user has access to. I’ve already explained in details regarding Authorization in my previous post on Spring Security […]

Image Classification In Android Using Tensor Flow

Tensor Flow is an end-to-end open source platform for machine learning. It has a comprehensive, flexible ecosystem of tools, libraries and community resources that lets researchers push the state-of-the-art in ML and developers easily build and deploy ML powered applications. TensorFlow provides a variant called TensorFlow Lite, which is a lightweight library for deploying models […]

Spring Security Implementation Using JDBC API

In this article I’ll be showing you guys how to implement authentication and authorization using Spring Security and JDBC APIs. Authentication refers to the process of confirming identity and Authorization refers to the process of verifying what a user has access to. For the purpose of the tutorial we’ll be creating 3 endpoints / (root): […]

Back To Top