Successful analytics depends on choosing the right approach to storing your enterprise data.
Welcome back to part two of this series on metaprogramming in Elixir. In part one, we introduced metaprogramming and gave a brief overview of macros. In this part, we will explore the inner workings and behaviors of macros in more depth. As discussed in the previous post, macros are compile-time constructs in Elixir. So, before diving into how macros work, it is important to understand where macros lie within Elixir’s compilation process.
As Kong continues to expand its global footprint, we recently added Kore Labs, experts in FinTech digital product lifecycle management solutions, to the Kong customer community in the UK. Kore built its cloud-enabled solution on top of Kong in order to revamp its architecture to scale and provide customized solutions for its clients.
Normally, you must submit a password in order to log into an application. In the case of two-factor authentication, you must also provide a one-time temporary password (also known as a token) in addition to your regular password. You can get this OTP in a variety of ways. The different varieties of 2FA are determined by how the OTP is provided. The OTP can be sent via email, SMS, as a software token using applications such as Google Authenticator, or as a hardware token.