Functional Programming

OOP’s, What are the important concepts of OOPS in Java?

Reading Time: 5 minutes OOP’s is “Object Oriented Programming”,it consists objects and classes and therefore in this,programming is done with class and object. WHAT IS “CLASS’ ? OOP’s A class in java is a blueprint contains all the methods,functions,main in simple words the whole code is enclosed inside the class.Therefore class is a block contains everything.Like a capsule enclosed medicines inside it. WHAT IS AN “OBJECT”? It is a Continue Reading

Set up the environment for the stm32-Discovery Board

Reading Time: 4 minutes In today’s blog, we will set up the environment for the stm32 discovery board. We are only going to set up the configurations for the “Linux System”. In previous blogs we discussed the Valid and Invalid Addresses, you can check those blogs to get a better understanding of how to work with the Register Addresses. As we are working with the Embedded Systems they make Continue Reading

Capabilities of the Microcontroller. Don’t underestimate the mini-computer

Reading Time: 4 minutes The microcontroller on which we are working does have different capabilities which help us in making our work more efficient, better, and easier. The microcontroller stm32f3-discovery board also shares multiple capabilities that we use to solve all sorts of different problems. In all my previous blogs we talked about the internals of the stm32 discovery board like how we can achieve safe access to the Continue Reading

Introduction to Keycloak

Reading Time: 3 minutes Hey champs, let us try to understand about keycloak services, benefits and their feature etc. Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It’s all available out of the box. You’ll even get advanced features such as User Federation, Identity Brokering and Social Login. IAM(Identity Access Management) IAM or IdM(Identity Management) is a Continue Reading

Raw Pointers in Unsafe Rust are quite powerful

Reading Time: 4 minutes Unsafe Rust. Sounds contradicting to what we know about Rust as Rust is one of the safest and memory-efficient languages. It does not have a garbage collector because it does not need one. Rust has wonderful borrowing and ownership rules that take care of all the memory safety issues. It is one of the leading languages.  More than 9 companies including Dropbox, Coursera, Figma, npm, Microsoft, Cloudflare, Continue Reading

Working on Substrate? Must know about Runtime APIs.

Reading Time: 3 minutes Hello Readers!! In this blog we will see what is a Runtime API and how we can create and use it. Each Substrate node contains a runtime. The runtime contains the business logic of the chain. It defines what transactions are valid and invalid and determines how the chain’s state changes in response to transactions. To use runtime upgrades, the runtime is compiled to Wasm. Continue Reading

Let’s say Hello to the Hardware. A Magical Conversation!

Reading Time: 4 minutes In recent blogs we discussed the consequences of writing directly to a Register’s Address, if you have not read that blog then I suggest you please go through that one, you’ll find it interesting. What we are gonna do today?? Okay, let’s do something more interesting today we are not gonna work on registers nor in-depth of Hardware. Today we will talk with our hardware(stm32f3-discovery-board). Continue Reading

Introduction to Kubernetes Deployment Strategies

Reading Time: 3 minutes Kubernetes provides Deployment resource which tells the Kubernetes the desired state for the application.Deployment are declarative, which means that they have what to achieve not how to achieve. To achieve this desired state, under the hood deployment uses ReplicaSets, which further maintains the required sets of the pods. Update in Deployments Using deployment we can achieve the desired state of an application in K8s Cluster, Continue Reading

Intro to the amazing world of Shell scripting

Reading Time: 7 minutes Shell Scripting A shell script uses the Linux commands to perform a particular task. It provides loop and conditional control structures that repeat Linux commands or make decisions on which commands you want to execute. It will be very easy to learn if you already have some experience in programming (a very basic level will also work fine). Shell Scripting provides automation, makes repetitive task, Continue Reading

Substrate’s Smart Contracts vs. Runtime Development

Reading Time: 3 minutes This article gives a brief overview of the different ways to implement smart contracts for Substrate-based blockchains. It also aims to provide insight on reasons for choosing smart contract development over runtime development for your on-chain logic and business development. Substrate provides two smart contract virtual machines which can be added to your runtime. Each come with additional tools to ease development depending on your Continue Reading

How to work with “No Invalid Address”? Safe Access

Reading Time: 3 minutes In the previous blog, we tried to write directly to the BSRR Register address and that was not Safe Access because of which we fall into Hardware Fault exception. You can read that blog from here. Now in this blog, we are going to work in a very different way. We are not going to use the BSRR register instead of that we are going Continue Reading

Will WebAssembly replace JavaScript?

Reading Time: 4 minutes One of the most powerful innovations in recent past decades for the internet, WebAssembly is an open standard that defines a portable binary-code format for executable programs. It is fast and portable in the real sense. What makes it really useful is the fact that most of the programming languages including Rust and C++ have wasm as the compile target. Rust is a very powerful Continue Reading