'Building application at Scale' was a topic of discussion in one of the group I am part of. Following is my take. I got a bit confused - is focus on 'buildings applications at scale' or 'building applications that scale'. Both are slightly different. Let's distinguish. By 'building applications at scale' I mean - 1.… Continue reading Building applications at scale and that scale..
Author: Som
Trustless trustworthy network – Part 3
Read Part-1 and Part-2 to get the complete picture. Please note, from Part-1, the special number that Mr. B provided to Mr. A while purchasing Bitland. The special number was - 04ce875702b93398d29b2bf5af7878dd86130cca4f1a53143b82af53c02089e2d56609a16e08a1cd7a68e355a5d893f22f90d30d4ecb25f6d1afeebc0917d3d01e As you can see in Part-2 this is the Public-Key. We can say Mr. B generated this Public-Key using his Private-Key. Mr A… Continue reading Trustless trustworthy network – Part 3
Trustless trustworthy network – Part 2
To understand how Mr. E of Blcokchainians verifies ownership of Bitland described in Part-1, we need to understand, without really going into the mathematical details, the digital signature and verification mechanism. The algorithm used is ECDSA - Elliptic Curve Digital Signature Algorithm. For those of you who are a bit more mathematically inclined, read this… Continue reading Trustless trustworthy network – Part 2
Trustless trustworthy network – Part 1
It took a while for me to get a complete picture of how bitcoins change hands. It is completely unlike the way we deal our money, cash – digital or otherwise. In our day-to-day life, if somebody pays us, say in currency notes, we carry that with us, in our wallet. The currency note changes… Continue reading Trustless trustworthy network – Part 1
Proof of work for dummies
Why is it such a hard work to guess a number less than a given number? Isn't that what happens in Bitcoin mining? 'I cannot understand this' said one of my friend who does not have any connection to IT beyond using mobile phone. Here is my try. First thing first, numbers. We need to… Continue reading Proof of work for dummies
Web 3.0, Crypto and Blockchain
For a while, it troubled me why Web 3.0 is linked to Blockchain and Crypto currencies. Here is my take. Though crypto, bitcoin, blockchain are all mixed up, there are broadly two parts. Blockchain is the underlying technology—part1, Bitcoin(cryptocurrency in general) is an application/solution built on Blockchain—part 2. Blockchain is a decentralized and immutable ledger.… Continue reading Web 3.0, Crypto and Blockchain
Metaverse?
I am not a big fan of social media. I don't spend much time on it. It does not interest me. Furthermore, I have never followed technology trends in social media space. There is a lot of buzz around Metaverse, particularly so after FB renamed itself to Meta. It keeps coming up in my newsfeed… Continue reading Metaverse?
Agile Anti Patterns – Part 2
I read this interesting post on Agile Antipatterns. This is the second part of my take on these antipatterns. Here is the first part. 5. Scrum Master Avoids Conflict and Doesn’t Like to be Challenged If it is a behavioural trait of an individual (avoiding conflicts/taking offence) one can only train the person and hope for… Continue reading Agile Anti Patterns – Part 2
Agile Anti Patterns – Part 1
I read this interesting post on Agile Antipatterns. Various agile methodologies are in practice since early 2000. Today, Agile practices in IT world are given. I have, at least, forgotten what it used to be before agile. Yet, even today, we continue to see more or less the same antipatterns. Here is my take on… Continue reading Agile Anti Patterns – Part 1
SMEs and Productivity Tools
I recently caught up with a group of friends who have started a software development start-up. They have been working as freelancers and recently, they got a couple of projects and have a small team now. One of their project was a software for managing contract employees built for a company which deals with a… Continue reading SMEs and Productivity Tools