<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on Dev Matters</title><link>https://www.munish-mehta.com/post/</link><description>Recent content in Posts on Dev Matters</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 21 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://www.munish-mehta.com/post/index.xml" rel="self" type="application/rss+xml"/><item><title>Google Gemini 3 Pro - Redefining the Agentic Frontier and Enterprise Intelligence</title><link>https://www.munish-mehta.com/post/google-gemini-pro-3/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/google-gemini-pro-3/</guid><description>A deep dive into Google Gemini 3 Pro—its architecture, benchmark performance, enterprise use cases, and strategic implications for agentic AI.</description></item><item><title>The Art and Impact of Article Writing Structure Strategy and Substance</title><link>https://www.munish-mehta.com/post/the-art-and-impact-of-article-writing-structure-strategy-and-substance/</link><pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/the-art-and-impact-of-article-writing-structure-strategy-and-substance/</guid><description>This article explores the art and impact of article writing, including structure, strategy, and substance.</description></item><item><title>Get Custom Answers From ChatGPT</title><link>https://www.munish-mehta.com/post/get-custom-answers-from-chatgpt/</link><pubDate>Wed, 19 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/get-custom-answers-from-chatgpt/</guid><description>This guide shows you the four built-in ways to tailor ChatGPT to your context: Memories, Projects, Custom Instructions, and GPTs. It tells you what each one does, when to use which, and how to set them up quickly.</description></item><item><title>Perplexity Gmail Connector vs Google Gemini in Gmail</title><link>https://www.munish-mehta.com/post/perplexity-gmail-connector-vs-google-gemini-in-gmail/</link><pubDate>Mon, 20 Oct 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/perplexity-gmail-connector-vs-google-gemini-in-gmail/</guid><description>In this article, we explore the differences between Gmail Connector and Google Gemini in Gmail, highlighting the key features and advantages of each option.</description></item><item><title>Architecting the Architect: Using AI to Instruct AI to Build with AI</title><link>https://www.munish-mehta.com/post/windsurf/building-a-startup-with-ai/</link><pubDate>Mon, 14 Jul 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/windsurf/building-a-startup-with-ai/</guid><description>Explore how AI is revolutionizing software development as we use ChatGPT to guide Windsurf IDE&amp;rsquo;s SWE-1 model in building a complete expense-sharing application. This series demonstrates the future of AI-assisted development, from prompt engineering to deployment.</description></item><item><title>From Idea to Live Site: How I Build AI-Powered Websites in a Day</title><link>https://www.munish-mehta.com/post/ai-powered-workflow-for-building-websites/</link><pubDate>Sat, 12 Jul 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ai-powered-workflow-for-building-websites/</guid><description>Learn how to go from a random idea to a fully functional website in just a day using AI tools. This guide walks you through a practical 6-step workflow for idea generation, design, coding, and deployment — even if you’re not a professional developer.</description></item><item><title>Secure CV Access with OTP and AWS</title><link>https://www.munish-mehta.com/post/behind-the-scene-privacy-flow-cv-access/</link><pubDate>Wed, 18 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/behind-the-scene-privacy-flow-cv-access/</guid><description>A technical breakdown of how a privacy-first CV request system was designed using AWS Lambda, DynamoDB, SES, and SNS.</description></item><item><title>Implementing a Privacy-Respecting CV Request Flow with OTP Verification</title><link>https://www.munish-mehta.com/post/privacy-flow-cv-access/</link><pubDate>Tue, 17 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/privacy-flow-cv-access/</guid><description>Learn how to implement a secure, privacy-first flow for handling CV download requests using email and optional SMS-based OTP verification.</description></item><item><title>Cyber Security Toolkit</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-security-toolkit/</link><pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-security-toolkit/</guid><description>Cyber security starts at home. From app safety to breach monitoring, this toolkit equips you with the everyday habits that keep you and your family secure in a connected world.</description></item><item><title>Digital Detectives</title><link>https://www.munish-mehta.com/post/cyber-security/digital-detectives/</link><pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/digital-detectives/</guid><description>Case studies are not just headlines — they’re digital crime stories solved through clever forensics, logs, and sometimes just a typo. Learn how everyday mistakes led to the capture of modern cyber criminals.</description></item><item><title>Inside the Dark Web</title><link>https://www.munish-mehta.com/post/cyber-security/dark-web/</link><pubDate>Sat, 07 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/dark-web/</guid><description>Most people never touch it — but the Dark Web plays a hidden role in fraud, scams, and leaked data. This post lifts the veil on what really happens there, how it affects everyday people, and why awareness is your best defence.</description></item><item><title>The Price of Free</title><link>https://www.munish-mehta.com/post/cyber-security/the-price-of-free/</link><pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/the-price-of-free/</guid><description>Free apps aren&amp;rsquo;t really free — they harvest your data and leave you exposed. This post uncovers how everyday Australians are being profiled, leaked, and sold across the web, and how to take back control of your digital life.</description></item><item><title>Your OTP Isn’t Safe</title><link>https://www.munish-mehta.com/post/cyber-security/otp-scams/</link><pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/otp-scams/</guid><description>Think OTPs keep you safe? Think again. This post reveals 12 real-world ways scammers steal or bypass One-Time Passwords in Australia — from SIM swaps and spoofed messages to malware and call forwarding tricks — plus what you can do to truly protect your identity and accounts.</description></item><item><title>Digital Arrests, Loan App Blackmail &amp; High-Stakes Scams Targeting Australians</title><link>https://www.munish-mehta.com/post/cyber-security/digital-arrest-scam/</link><pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/digital-arrest-scam/</guid><description>Digital arrest and loan app scams are rising in Australia. Learn how these psychological traps work — and how to protect yourself from high-stakes fraud.</description></item><item><title>Don’t Click That Link!</title><link>https://www.munish-mehta.com/post/cyber-security/online-scams/</link><pubDate>Tue, 03 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/online-scams/</guid><description>From QR code traps to phishing links and fake Telstra calls, discover how social engineering scams manipulate trust — and how to stay two steps ahead.</description></item><item><title>Cyber Crime is Booming in Australia</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-crime-australia/</link><pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-crime-australia/</guid><description>Cyber crime is exploding across Australia, affecting everyday individuals — not just large companies or tech newbies. In this post, I break down why no one is immune, the real scale of cyber threats in our country, and the common scams that are catching smart people off guard. If you’ve ever thought &amp;ldquo;it won’t happen to me,&amp;rdquo; this is your wake-up call.</description></item><item><title>Cyber Crime:The Digital Threats Lurking in Everyone's Life</title><link>https://www.munish-mehta.com/post/cyber-security/cyber-security-intro/</link><pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/cyber-security/cyber-security-intro/</guid><description>Cyber crime isn’t just a technical issue — it’s a human one. This series is your practical guide to understanding how modern scams work, who’s behind them, and how you can protect yourself in today’s digital Australia. Start here and follow each post to become cyber smart, not cyber scared.</description></item><item><title>The Curious Case of Alice Bob and Friends</title><link>https://www.munish-mehta.com/post/the-curious-case-of-alice-bob-and-friends/</link><pubDate>Sat, 08 Feb 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/the-curious-case-of-alice-bob-and-friends/</guid><description>Ever wondered why Alice, Bob, Eve, and Mallory keep showing up in cryptography and programming examples? Discover their origins, roles, and why developers can’t stop using these legendary placeholder names.</description></item><item><title>Who is Foo Bar and Baz</title><link>https://www.munish-mehta.com/post/who-is-foo-bar-and-baz/</link><pubDate>Sun, 02 Feb 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/who-is-foo-bar-and-baz/</guid><description>Ever wondered why programming examples mostly use &lt;strong>foo&lt;/strong>, &lt;strong>bar&lt;/strong> and &lt;strong>baz&lt;/strong>? These words trace back to military slang &lt;strong>(FUBAR)&lt;/strong> and early computing culture. Used as &lt;strong>neutral placeholders,&lt;/strong> they help programmers focus on logic rather than real-world names. This post explores their origins, evolution, and why they remain an inside joke in coding.</description></item><item><title>Recap, Further Resources, and Closing Thoughts</title><link>https://www.munish-mehta.com/post/recap-further-resources-and-closing-thoughts/</link><pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/recap-further-resources-and-closing-thoughts/</guid><description>In this final post, we review key SSH insights—from setup and security hardening to advanced techniques—highlight top resources for continued learning, and propose practical projects so you can confidently take your SSH skills to the next level.</description></item><item><title>SSH Alternatives and Enhancements</title><link>https://www.munish-mehta.com/post/ssh-alternatives-and-enhancements/</link><pubDate>Tue, 28 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-alternatives-and-enhancements/</guid><description>In this one-stop guide, I will explore how tools like mosh (for high-latency resilience), Teleport (zero-trust and ephemeral certificates), and WireGuard-powered VPNs offer alternatives or enhancements to traditional SSH, each bringing unique advantages for more secure, flexible, and high-performance remote access.</description></item><item><title>Automating Tasks With Automation</title><link>https://www.munish-mehta.com/post/automating-tasks-with-automation/</link><pubDate>Mon, 27 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/automating-tasks-with-automation/</guid><description>Tired of repetitive server chores? Let SSH automation handle the heavy lifting, so you can focus on real innovation</description></item><item><title>Troubleshooting Common SSH Issues</title><link>https://www.munish-mehta.com/post/troubleshooting-common-ssh-issues/</link><pubDate>Sun, 26 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/troubleshooting-common-ssh-issues/</guid><description>From verbose logs to file permissions, a bit of know-how goes a long way in keeping your SSH sessions smooth and secure</description></item><item><title>Advanced SSH Techniques</title><link>https://www.munish-mehta.com/post/advanced-ssh-techniques/</link><pubDate>Sat, 25 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/advanced-ssh-techniques/</guid><description>Elevate Your Remote Access: Master Advanced SSH Techniques for a Smoother, More Secure Workflow!</description></item><item><title>SSH Best Practices and Security Hardening</title><link>https://www.munish-mehta.com/post/ssh-best-practices-and-security-hardening/</link><pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-best-practices-and-security-hardening/</guid><description>Fortify Your Remote Access: Hardening SSH for Unyielding Security</description></item><item><title>SSH Key Based Authentication</title><link>https://www.munish-mehta.com/post/ssh-key-based-authentication/</link><pubDate>Thu, 23 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/ssh-key-based-authentication/</guid><description>Secure Shell is all about convenience and security. Once you get comfortable with these essentials, you’ll be well on your way to harnessing the full power of SSH!</description></item><item><title>Setting Up and Using SSH</title><link>https://www.munish-mehta.com/post/setting-ssh/</link><pubDate>Wed, 22 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/setting-ssh/</guid><description>In this article i would be show you how to set up and use SSH to make our first secure connection.</description></item><item><title>Introduction to SSH</title><link>https://www.munish-mehta.com/post/introduction-to-ssh/</link><pubDate>Tue, 21 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/introduction-to-ssh/</guid><description>In this article i would be discussing what were the shortcomings of earlier protocols such as SSH and why SSH was discovered</description></item><item><title>How Machines Securely Communicate with Each Other</title><link>https://www.munish-mehta.com/post/how-machines-securely-chat-each-other/</link><pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/how-machines-securely-chat-each-other/</guid><description>Have you ever wondered how computers securely talk to each other across the internet, without prying eyes snooping on their conversation? Welcome to the first part of my brand-new blog series, where I would try to demystify &lt;strong>SSH&lt;/strong>—the silent hero of remote server management and secure communication.</description></item><item><title>How I Started My Blogging Site With Hugo</title><link>https://www.munish-mehta.com/post/how-i-started-my-blogging-site-with-hugo/</link><pubDate>Sat, 11 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/how-i-started-my-blogging-site-with-hugo/</guid><description>In this article i would be explaining how i started my blogging site with hugo</description></item><item><title>Encryption for Apis</title><link>https://www.munish-mehta.com/post/encryption-for-apis/</link><pubDate>Tue, 20 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/encryption-for-apis/</guid><description>This article discusses what is encryption, how it works, how encryption keys are generated, key terminologies for encryption in context with APIs and strategies for API encryption.</description></item><item><title>Essential Questions to Ace Your Next DevOps Job Interview</title><link>https://www.munish-mehta.com/post/devops-interview-questions/</link><pubDate>Mon, 19 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/devops-interview-questions/</guid><description>In this article i would delve into few of the top interview questions covering DevOps principles, continuous integration, deployment strategies, infrastructure automation, and more to enhance your chances of landing that dream DevOps role.</description></item><item><title>API Authentication and Authroization</title><link>https://www.munish-mehta.com/post/api-authentication-vs-authorization/</link><pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/api-authentication-vs-authorization/</guid><description>The two terms often used in tandem for access control in almost every system but they are inherently different. In this article i will try to explain difference between these two terms.</description></item><item><title>Building Secure Apis Safeguarding Data and Trust</title><link>https://www.munish-mehta.com/post/building-secure-apis-safeguarding-data-and-trust/</link><pubDate>Thu, 01 Jun 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/building-secure-apis-safeguarding-data-and-trust/</guid><description>This article discusses why is it very important to build APIs in a secure manner and what are the strategies that can be employed to secure API during development and after development.</description></item><item><title>Unsung Heros of Interconnected world - APIs</title><link>https://www.munish-mehta.com/post/api/</link><pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/api/</guid><description>In the ever-evolving digital landscape, where interconnectedness and seamless integration reign supreme, APIs (Application Programming Interfaces) have emerged as the unsung heroes behind the scenes. These ingenious lines of code serve as the gateway to a world of limitless possibilities&amp;hellip;</description></item><item><title>Installing Jupyter Notebook in virtual env</title><link>https://www.munish-mehta.com/post/installing-jupyter-notebook-with-virtualenv/</link><pubDate>Sat, 29 Apr 2023 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/installing-jupyter-notebook-with-virtualenv/</guid><description>Jupyter Notebook is a popular choice among data scientist and data engineer developing application. There are numerous factors of why Jupyter Notebooks are preferred choice for getting up and running quickly. There are several posts why they do so. &lt;a href="https://realpython.com/lessons/why-use-jupyter-notebooks/">This&lt;/a> article on real python nicely explains.</description></item><item><title>Obsidian Sync as service</title><link>https://www.munish-mehta.com/post/obsidian-sync-part3/</link><pubDate>Sun, 06 Nov 2022 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/obsidian-sync-part3/</guid><description>The series completes the tutorial Obsidian Sync. If implemented you can save few bucks every year and still have Obsidian Sync in cloud.</description></item><item><title>Obsidian Sync script</title><link>https://www.munish-mehta.com/post/obsidian-sync-part2/</link><pubDate>Sat, 05 Nov 2022 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/obsidian-sync-part2/</guid><description>This article will setup vault repository in github. Then we show to write a small but effective script to add. commit and push to remote repository.</description></item><item><title>Obsidian Sync</title><link>https://www.munish-mehta.com/post/obsidian-sync/</link><pubDate>Mon, 12 Sep 2022 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/obsidian-sync/</guid><description>This document chart out plan the way will use git to store obsidian vault. Next article in series will elaborate on this foundation to achieve target results.</description></item><item><title>AWS - Getting Started</title><link>https://www.munish-mehta.com/posts/getting-started-with-aws/</link><pubDate>Sun, 11 Sep 2022 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/posts/getting-started-with-aws/</guid><description>This tutorial guides you through initial steps getting started with Amazon Web Service (AWS). AWS is the leading cloud solution providers and most organizations have developed or migrated their business online.</description></item><item><title>How to configure docker to use HTTP proxy</title><link>https://www.munish-mehta.com/post/use-docker-behind-http-proxy/</link><pubDate>Tue, 13 Mar 2018 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/use-docker-behind-http-proxy/</guid><description>&lt;img src="https://www.munish-mehta.com/images/docker/docker_hu6501580184772560139.png" alt="configuring proxy for docker">


&lt;h2 id="ubuntu">Ubuntu&lt;/h2>
&lt;h3 id="set-docker-to-use-http-proxy">Set docker to use http proxy&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#282a36;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-gdscript3" data-lang="gdscript3">&lt;span style="display:flex;">&lt;span>sudo &lt;span style="color:#ff79c6">/&lt;/span>etc&lt;span style="color:#ff79c6">/&lt;/span>default&lt;span style="color:#ff79c6">/&lt;/span>docker
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ff79c6">export&lt;/span> http_proxy&lt;span style="color:#ff79c6">=&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;http://127.0.0.1:3128/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ff79c6">export&lt;/span> https_proxy&lt;span style="color:#ff79c6">=&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;http://127.0.0.1:3128/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ff79c6">export&lt;/span> HTTP_PROXY&lt;span style="color:#ff79c6">=&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;http://127.0.0.1:3128/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#ff79c6">export&lt;/span> HTTPS_PROXY&lt;span style="color:#ff79c6">=&lt;/span>&lt;span style="color:#f1fa8c">&amp;#34;http://127.0.0.1:3128/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title>Vim Tips</title><link>https://www.munish-mehta.com/post/vim-tips/</link><pubDate>Fri, 09 Feb 2018 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/vim-tips/</guid><description>&lt;p>
 &lt;img src="https://www.munish-mehta.com/images/vim/vim.jpg" alt="vim">

&lt;/p>
&lt;h2 id="vim-graphical-cheat-sheet">vim graphical cheat sheet&lt;/h2>
&lt;p>
 &lt;img src="//img/2018-02-09-vim-tips/vi-vim-cheat-sheet.svg" alt="">

&lt;/p></description></item><item><title>How to execute docker commands using non-root users</title><link>https://www.munish-mehta.com/post/docker-without-sudo/</link><pubDate>Tue, 09 Jan 2018 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/docker-without-sudo/</guid><description>This article will show you how to execute docker commands using non-root users</description></item><item><title>Welcome to My Blog</title><link>https://www.munish-mehta.com/post/hello-world/</link><pubDate>Mon, 31 Oct 2016 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/hello-world/</guid><description>&lt;blockquote>
&lt;p>“Yeah It&amp;rsquo;s on. ”&lt;/p>
&lt;/blockquote>
&lt;h2 id="hello-world">Hello World!&lt;/h2></description></item><item><title/><link>https://www.munish-mehta.com/post/medium-ready/api-authentication-vs-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/medium-ready/api-authentication-vs-authorization/</guid><description>&lt;h1 id="api-authentication-and-authroization">API Authentication and Authroization&lt;/h1>
&lt;p>&lt;em>Subtitle&lt;/em>&lt;/p>
&lt;blockquote>
&lt;p>The two terms often used in tandem for access control in almost every system but they are inherently different. In this article i will try to explain difference between these two terms.&lt;/p>
&lt;/blockquote>
&lt;p>
 &lt;img src="https://www.munish-mehta.com/images/apis/AuthenticationvsAuthorization.jpeg" alt="Authentication Vs Authorization">


In simplest terms, &lt;em>Authentication&lt;/em> is the process of verifying the identity of a user or system requesting access to an API, while &lt;em>Authorization&lt;/em> determines what actions and resources a user or system is allowed to access within the API based on their authenticated identity. Let us see each of it one by one.&lt;/p></description></item><item><title/><link>https://www.munish-mehta.com/post/medium-ready/api/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.munish-mehta.com/post/medium-ready/api/</guid><description>&lt;h3 id="what-is-an-api---definition">What is an API - Definition&lt;/h3>
&lt;p>An API is a connection between &lt;a href="https://en.wikipedia.org/wiki/Computer">computers&lt;/a> or between &lt;a href="https://en.wikipedia.org/wiki/Computer_program">computer programs&lt;/a>. It is a type of software &lt;a href="https://en.wikipedia.org/wiki/Interface_(computing)">interface&lt;/a>, offering a service to other pieces of &lt;a href="https://en.wikipedia.org/wiki/Software">software&lt;/a>.
(source: wikipedia)&lt;/p>
&lt;h3 id="understanding-the-meaning-of-api">Understanding the meaning of API&lt;/h3>
&lt;p>The Definition may not make the meaning absolutely clear what exactly is an API. Lets try to understand what exactly API may mean. The first example would be a real world example while second would suit more someone who is familiar with programming.&lt;/p></description></item></channel></rss>