Posts by Year

2024

Cleanup GitHub workflows jobs

2 minute read

Automating the cleanup of GitHub workflow runs can save valuable time and keep your repository organized. Instead of manually deleting outdated or failed wor...

Configuring verifiable links

12 minute read

This blog post provides an step-by-step walkthrough on creating the assetlinks.json for Android and apple-app-site-association for iOS files in IBM Security ...

Back to top ↑

2023

Backup with rclone

5 minute read

I experienced an event recently, which caused me to review my backup strategy. I was “somehow” backing up my data to a cloud sync service. Yes, I’m aware syn...

Create your own authenticator

9 minute read

The IBM Verify SDK 2.x provides developers a convenient way to create their own authenticator with IBM Security Verify (ISV - Cloud) and IBM Security Verify ...

Verify OTP configurations

4 minute read

One-time passwords (OTP) are widely used as a 2nd factor to add an additional layer of security to your account’s login. Despite that its configuration is co...

Push notification permissions in Android 13

1 minute read

In Android 13, Google changed the way how push notification opt-ins are handled. It is now required that obtain the permission from the user in order to send...

Back to top ↑