Reading Time: 6 minutes DAML is an open-source language used to write distributed applications quickly,concisely and correctly. It runs on leading blockchain platforms like Hyperledger Sawtooth , fabric and Corda. It is used to build smart contracts for distributed ledgers and provide us with ability to focus more on business workflow instead of the blockchain implementation. In our previous blogs, Building Powerful Smart Contracts, Getting started with building Templates Continue Reading
Reading Time: 3 minutes With the prevalence of 64-bit operating systems, many applications have become 64-bit compliant. But, there is a large group of existing native applications that still run in 32-bit compatibility mode on 64-bit operating systems. While integrating 64-bit applications with 32-bit applications, we face numerous compatibility challenges relating to the size of the data type, address, pointers, binary format, and runtime dependencies. The 64-bit applications cannot Continue Reading
Reading Time: 5 minutes In this blog, we are going to look at what the Builder Pattern is and how does it help us construct objects of classes easily. But before understanding that, we need to understand why did we come up with the Builder Pattern in the first place. So, let’s discuss the problem statement due to which the Builder Pattern came into existence.
Reading Time: 2 minutes Hi Everyone, In our previous blogs, we have discussed several Structural design patterns i.e., Decorator design pattern, Adapter design pattern and Proxy design pattern. In this blog, we will be discussing Facade Design pattern and will try to implement it in Scala. Problem Statement: We recently had a tour to Udaipur from our office and to organize it, we inquired a travel agency and asked Continue Reading
Reading Time: 2 minutes Hi Everyone! In our previous blogs, we have discussed Decorator design pattern and Adapter design pattern. Now, its time to discuss another Structural design pattern i.e. the Proxy design pattern. We will implement the same EUGDPR problem using the Proxy design pattern, which we implemented using the Adapter design pattern in our previous blog. Problem Statement: Earlier, in many applications, all the user-specific details like Continue Reading