Latest stories

Perfect Secrecy

P

When dealing with encryption, there is a negligible probability that an attacker will be able to try out all the possible keys used to encrypt the message. Can we make an encryption scheme which will be secure even if attacker has infinite power?

Design patterns: Singleton pattern

D

There can be requirements when we need variables to maintain data for the system (like some global parameters) or need to call methods from the class without creating a new instance of the class every time. One solution to these situations will be to use static fields and methods. But with static, you can not inherit the methods or variables from another class or interface. Because of this, you...

Book Review: The Pheonix project

B

Bill is promoted to the VP of the IT operations and is given the resposibility to lead The Pheonix Project which will decide the future of the Parts Unlimited. This is a novel about the importance of IT operations in the organization and how the protagonist learns the new ways to work efficiently.

Software design patterns

S

One of the most important skills for a software developer is to be able to create software that is scalable, extendable, and modular. This post is an introduction to the series on software design patterns and in this article, we will talk about what design patterns are, why should we learn and apply them in our software projects.

Book Review: TIME SMART

B

Do you always feel overwhelmed by the work you are getting? Or that you never seem to have enough time to do everything you want to do? In this book, the author is trying to explain how most of us undervalue our time when we have to choose between time and money. And also, how we can get the best out of the same 24 hours available to all of us.

Universally Unique Identifier

U

Almost all the programming languages have a library function for generating a Universally Unique Identifier (UUID). These libraries are responsible for generating an identifier that is unique in the whole universe. How do these libraries go around the complete universe and generate a unique identifier in just a few milliseconds?

Course review: Cryptography-I

C

Cryptography-I is offered by Professor Dan Boneh from Stanford University on the Coursera platform. The course is about the theory and practice of modern cryptography and provides an in-depth view of the field.

Akshay Jain

I am passionate about programming and feel amazing when I see people using the software I have contributed in. I believe it is essential to write high quality code, which is easy to understand and test. I am still a work in progress and decided to document and share some of my learnings with everyone. Apart from that, I like to read books, and so you might find a lot of book reviews on my blog. I am working as a Software Engineer at Oracle since post-graduation from IISc Bangalore, and happily married :)

Get in touch