Angelo Mathews and Marvan Atapattu pictured prior to the Pallekele Test against Pakistan I thought about ranting on it after the Test defeat in Sharjah. Mathews had just been baptised as the captain. So let’s wait,... The post The Angelo Mathews-Marvan Atapattu combo and the retrograde of Sri Lanka cricket appeared first on The Arm Chair Critic.
In the previous article, we saw how we order transactions in a blockchain by hashing transactions. However, this alone doesn’t help achieve consensus as we haven’t found a way to solve the confusion we talked… Read More The post Blockchain consensus using a puzzle appeared first on The Armchair Critic.
This tutorial explains in detail how Redux can be integrated into your Flutter app to help manage the state of your Flutter app. The post Managing state in Flutter using Redux appeared first on The Armchair Critic.
OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On. The post Understanding OpenID Connect (OIDC) appeared first on The Armchair Critic.
User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their resources by third parties. To understand how User Managed Access works, it is paramount that you understand how OAuth 2.0... Continue Reading → The post Getting started with User Managed Access (UMA) appeared first on The Armchair Critic.
In the previous article, we took a look at how we verify transactions in detail. In this article, we will look at why the order of transactions matters and how we can establish an order.… Read More The post Establishing an order of transactions in blockchain appeared first on The Armchair Critic.
I recently had to install and configure Jest in a React app written using Typescript and ran into quite a few roadblocks. So, I thought of detailing the steps I followed to overcome the difficulties. I used Jest as the... Continue Reading → The post Jest for a Typescript-based React app appeared first on The Armchair Critic.
Lerna comes to our rescue when we are to manage multiple inter-dependent packages within a repository. Have a package that is a dependency of another and you don’t want to waste time building the dependency, publishing it to npm, and... Continue Reading → The post Fix React Issues in Lerna using Yarn Workspaces appeared first on The Armchair Critic.
Do you want to add authentication to your Angular app? Gone are the days when you had to implement the backend logic to manage users and then write the frontend logic to manage user sessions.… Read More The post Add login to an Angular app using Asgardeo appeared first on The Armchair Critic.
This article discusses how we can use data to automatically select the best meme from a pool of memes, thereby negating the need for human intervention. … Read More The post Data-driven meme selection appeared first on The Armchair Critic.
Memetic computation is an extension of evolutionary computation that combines the use of memes and genes to produce better solutions. In this article, we discuss what memes are, and how they make evolutionary algorithms better,… Read More The post An introduction to memetic computation appeared first on The Armchair Critic.
WSO2 Identity Server has always been known for its technical brilliance and feature richness. But that wasn’t enough to satiate us. In order to provide an unparalleled user experience, we wanted to add one more… Read More The post How we built a frontend app for WSO2 Identity Server with React appeared first on The Armchair Critic.
So far, we have briefly touched upon the idea of the 51% attack and how it actually allows double spending to happen. In this article, we will start to look at the theoretical basis of the 51% attack.… Read More The post 51% attack-the probability of mining the next block appeared first on The Armchair Critic.
Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in detail. To begin with, CIAM... Continue Reading → The post How does CIAM differ from IAM? appeared first on The Armchair Critic.
We give ChatGPT, Bard and Bing to write a simple yet tricky React app and see who wins this battle of the chatbots.… Read More The post ChatGPT vs. Bard vs. Bing: Who aces the React test? appeared first on The Armchair Critic.
Single-Page Applications (SPAs) are fast becoming ubiquitous as they provide a far better user experience over the traditional multi-page applications. However, as is often the case with app development, a good user experience and security… Read More The post Best practices for OIDC authentication in SPAs appeared first on The Armchair Critic.
More often than not, securing access to your Single-Page Application (SPA) inevitably becomes an integral part of development. Asgardeo simplifies this by providing you with an Identity and Access Management (IAM) solution coupled with a… Read More The post How to secure SPAs with Asgardeo appeared first on The Armchair Critic.
This article discusses blockchain account addresses, how they are used to prove ownership of bitcoins and how blockchain transactions work.… Read More The post Proving Ownership of Coins in Blockchain appeared first on The Armchair Critic.
The online literature on blockchain is torn between too simplistic rundowns for non-techies and advanced hieroglyphic riddles targeted at those who want to learn blockchain in depth. When I started learning blockchain, unfortunately, hardly did… Read More The post The motivation behind blockchain appeared first on The Armchair Critic.