A Beginner’s Guide to Earned Value Management
A Beginner’s Guide to Earned Value Management

Cost and Schedule both are inextricable part of Project Management, especially in case of medium to large scale projects. We focus on project management basics, as well as a wonderful tried and tested method called Earned value management (EVM).


How to use TLS to enable secure communications between the Hyperledger Fabric Network & Client
How to use TLS to enable secure communications between the Hyperledger Fabric Network & Client

Hyperledger Fabric is a decentralized private blockchain platform. Typically, we use the provided Fabric Client SDK to interact with the Fabric network. If we want the communication between these two to be secure, we can use the TLS (Transport Layer Security) protocol.


In our first blog, we learned how to program an Arduino board and call the API to know how much coffee we have, in real-time. In this blog, we will focus on API and mobile integration, so you can access this data on your phone!

API Integration

For this layer, I used Node.js. We need few dependencies in order to achieve the desired functionality. Update the dependencies in your package.json as shown below:

{
..
..
"dependencies": {
"express": "^4.17.1",
},
..
..
}


Once updated, run

npm install

I have used a simple service to get the value from…


Create Accessible Products with Inclusive Design
Create Accessible Products with Inclusive Design

Digital products designed and developed today often miss an important factor: ‘Designing for differently-abled people’. The United Nation’s 2030 Sustainable Development Agenda focuses on important aspects of accessibility.

These include respecting, protecting, & promoting equality, achieving full and productive employment for people with disabilities.

What is accessibility?

Accessibility is about creating designs and products which cater to a wide pool of people irrespective of the physical or visual impairments they may experience. Such limitations can be brought about by vision impairment, colour-blindness, hearing loss, cognitive, physical or hand tremors, or poor eye-sight due to old age etc.

When we talk about creating digital…


The Pros of Geofencing in Supply Chains
The Pros of Geofencing in Supply Chains

What is Geofencing?

Geofencing — ‘Geo’ is a prefix derived from the Greek word that means “earth” and the suffix ‘fencing’ means “an imaginary border”. Geofencing is basically a location-based service that enables us to detect and monitor when a vehicle or a person enters, exits, crosses, or bypasses a precise geographical area delimited by a virtual perimeter by generating instant alerts. These alerts are referred to as Geo notifications.

Geofencing uses GPS, RFID, or other location-tracking technology to define geographical boundaries. Users can define a circular or polygonal fence based on the business needs. To create a circular fence around a particular…


Broken Authentication & Session Management Flaws: Causes & Fixes
Broken Authentication & Session Management Flaws: Causes & Fixes

What is broken authentication?

Broken authentication is a widely used term reflecting a combination of vulnerabilities related to authentication and flawed implementations of session management functionalities. It lets threat agents exploit weaknesses in session and credentials management implementations.

It is the second most prevalent and impactful vulnerability as per the OWASP “Top 10” list.

Types of broken authentication attacks

Session hijacking attack

  • In a session hijacking attack, the user’s session is taken over by an attacker. A session usually starts when the user logs in and ends on logout or upon closing the browser.
  • When a user logs in, a temporary session cookie is set in the browser to acknowledge that the…


Use Temporary Credentials for Apps Running on EC2 Virtual Machines
Use Temporary Credentials for Apps Running on EC2 Virtual Machines

To leverage AWS services in their projects, developers generally use AWS-SDK or AWS CLI. For these, an admin creates an IAM user with programmatic access. He then shares access to these credentials with the developer. These credentials consist of an access key and a secret key ID. As a developer at DLT Labs, we use these credentials to sign API requests. By doing so, AWS can verify the user’s identity in API calls.

What happens if our credentials get exposed?

Anyone having our credentials would have the same level of access to the AWS resources that we have.

Credential’s management and its security have always been a…


How to Handle Project Assumptions & Constraints
How to Handle Project Assumptions & Constraints

Business requirements are those capabilities that help a business transform from its present-day state to a desired future state.

One of the reasons businesses successfully achieve their set objective is related very closely to how well that business’s needs are decomposed from high-level requirements to smaller specific requirements.

Why is this important?

This is important because, in a successful business, a project’s success is directly influenced by identifying what are the exact needs to design an appropriate solution, and how these needs can be met by developing specific requirements. On the other hand, assumptions, and constraints in turn influence requirements.

What are Assumptions?


Introducing DL Freight 2.0
Introducing DL Freight 2.0

Refinements to our highly secure, proprietary blockchain platform

Last month marked the one year anniversary of our launch of DL Freight and we’ve been celebrating the platform’s journey and accomplishments. Even though it feels amazing to have reached this milestone, it’s not the final destination for us, only the end of a chapter in an ongoing journey.

We believe it’s important to regularly monitor performance, get user feedback, keep tabs on industry trends and make refinements along the way. This ensures the platform continues running smoothly, adapting and expanding without interruption and reflecting user and industry needs.

This is also why so soon after its first anniversary, we’re…


Effective Asset Management
Effective Asset Management

The most important part of any company is its assets and keeping track of them appropriately is an essential part of operations. There are many benefits of doing this. Some of these include conducting scheduled maintenance effectively, ensuring compliance, and automating inventory management, to name a few.

Using a complete asset tracking system — comprising of tracking technologies and their supplementary software — is much more efficient than having to manually track items using a spreadsheet. It lets businesses accurately track their assets while reducing the risk of human error.

Physical assets can be tracked using different technologies. Before we…

DLT Labs

DLT Labs is a global leader in Distributed Ledger Technology and Enterprise Products. To know more, head over to: https://www.dltlabs.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store