The Pros of Geofencing in Supply Chains
The Pros of Geofencing in Supply Chains

What is Geofencing?

Geofencing — ‘Geo’ is a prefix derived from the Greek word that means “earth” and the suffix ‘fencing’ means “an imaginary border”. Geofencing is basically a location-based service that enables us to detect and monitor when a vehicle or a person enters, exits, crosses, or bypasses a precise geographical area delimited by a virtual perimeter by generating instant alerts. These alerts are referred to as Geo notifications.

Geofencing uses GPS, RFID, or other location-tracking technology to define geographical boundaries. Users can define a circular or polygonal fence based on the business needs. To create a circular fence around a particular…


Broken Authentication & Session Management Flaws: Causes & Fixes
Broken Authentication & Session Management Flaws: Causes & Fixes

What is broken authentication?

Broken authentication is a widely used term reflecting a combination of vulnerabilities related to authentication and flawed implementations of session management functionalities. It lets threat agents exploit weaknesses in session and credentials management implementations.

It is the second most prevalent and impactful vulnerability as per the OWASP “Top 10” list.

Types of broken authentication attacks

Session hijacking attack

  • In a session hijacking attack, the user’s session is taken over by an attacker. A session usually starts when the user logs in and ends on logout or upon closing the browser.
  • When a user logs in, a temporary session cookie is set in the browser to acknowledge that the…


Use Temporary Credentials for Apps Running on EC2 Virtual Machines
Use Temporary Credentials for Apps Running on EC2 Virtual Machines

To leverage AWS services in their projects, developers generally use AWS-SDK or AWS CLI. For these, an admin creates an IAM user with programmatic access. He then shares access to these credentials with the developer. These credentials consist of an access key and a secret key ID. As a developer at DLT Labs, we use these credentials to sign API requests. By doing so, AWS can verify the user’s identity in API calls.

What happens if our credentials get exposed?

Anyone having our credentials would have the same level of access to the AWS resources that we have.

Credential’s management and its security have always been a…


How to Handle Project Assumptions & Constraints
How to Handle Project Assumptions & Constraints

Business requirements are those capabilities that help a business transform from its present-day state to a desired future state.

One of the reasons businesses successfully achieve their set objective is related very closely to how well that business’s needs are decomposed from high-level requirements to smaller specific requirements.

Why is this important?

This is important because, in a successful business, a project’s success is directly influenced by identifying what are the exact needs to design an appropriate solution, and how these needs can be met by developing specific requirements. On the other hand, assumptions, and constraints in turn influence requirements.

What are Assumptions?


Introducing DL Freight 2.0
Introducing DL Freight 2.0

Refinements to our highly secure, proprietary blockchain platform

Last month marked the one year anniversary of our launch of DL Freight and we’ve been celebrating the platform’s journey and accomplishments. Even though it feels amazing to have reached this milestone, it’s not the final destination for us, only the end of a chapter in an ongoing journey.

We believe it’s important to regularly monitor performance, get user feedback, keep tabs on industry trends and make refinements along the way. This ensures the platform continues running smoothly, adapting and expanding without interruption and reflecting user and industry needs.

This is also why so soon after its first anniversary, we’re…


Effective Asset Management
Effective Asset Management

The most important part of any company is its assets and keeping track of them appropriately is an essential part of operations. There are many benefits of doing this. Some of these include conducting scheduled maintenance effectively, ensuring compliance, and automating inventory management, to name a few.

Using a complete asset tracking system — comprising of tracking technologies and their supplementary software — is much more efficient than having to manually track items using a spreadsheet. It lets businesses accurately track their assets while reducing the risk of human error.

Physical assets can be tracked using different technologies. Before we…


How to Measure a Product’s Success
How to Measure a Product’s Success

In this day and age where digital disruption rules the roost, new digital products come to life in the blink of an eye. Promising to ease the customer of the pain points and problems faced in daily life, the cornerstone for the success of the product that gets built is defined by how extensively it gets used, the traction it gains, and its popularity with target customers.

While there cannot be one single mantra to success, the adage, “Any product is only as good as its usage” has been more relevant now than ever before!

In this blinding race to…


Build a Coffee Level Indicator to Understand IoT
Build a Coffee Level Indicator to Understand IoT

In this blog, we are going to see how to build a real-time coffee level indicator using an ultrasonic sensor and NodeMCU.

Reading this, a common reaction may be, “What did I just read!? What do you mean NodeMCU?”

Don’t worry! Let’s try to understand what exactly is this about. Ever heard of IoT? Short for ‘Internet of Things? Let’s throw some light on this topic before getting into the actual project.

So, what is IoT?

In short, IoT is about using day-to-day devices in a better and more efficient way by making them smarter. With the use of sensors attached to these devices…


How to Set Up an EC2 Instance?
How to Set Up an EC2 Instance?

In my previous blog, I covered the various storage solutions provided by AWS like S3 Glacier. Now that we understand how our application’s data is stored in a specific place, how about looking at getting the application up and running?

Before getting started with EC2 in AWS, let me give you a small recap of cloud computing and how it’s making our jobs a lot easier. While all the data and its processing is handled by servers, in the real world this data and processing can get overwhelming and handling it would mean huge investments in hardware (servers). …


How to Add a Payment Gateway to a Mobile App
How to Add a Payment Gateway to a Mobile App

Almost everything nowadays is executed digitally, even the payments we make to others and the items we purchase from merchants. To make payments possible we need to integrate various payment gateways into our apps.

I am an experienced hybrid mobile application developer at DLT Labs™, currently coding on the Google UI toolkit called Flutter. While contributing to an extraordinary application in my organization named DL Ecosystem, which works on revolutionary blockchain technology, I came across the need to learn how a payment gateway works and eventually how to integrate it into the application.

DL Ecosystem is a product that can…

DLT Labs

DLT Labs is a global leader in Distributed Ledger Technology and Enterprise Products. To know more, head over to: https://www.dltlabs.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store