We looked at the Proof-of-Work algorithm in the previous article, and in this article, we shall look at how we adjust the target hash based on the difficulty value to keep the transaction time constant.… Read More The post Difficulty adjustment in blockchain appeared first on The Armchair Critic.
We looked at Merkle proof in the previous article and that concluded our discussions on blocks and their structure. In this article, we shall look at the process of mining in detail. There are two… Read More The post Mining in blockchain appeared first on The Armchair Critic.
This article discusses the solution to the gambler's ruin problem as a precursor to understanding the probability of double spending. … Read More The post 51% attack: Gambler’s ruin problem appeared first on The Armchair Critic.
Very often, we need to protect APIs and a very good way of doing it is to use Open ID Connect (OIDC) authentication. In this article, we are going to take a look at how… Read More The post Protecting Azure API Management APIs using Asgardeo appeared first on The Armchair Critic.
useTransition and useDeferredValue are two new hooks React introduced with React 18 earlier this year. These two hooks make use of React’s concurrent rendering to allow developers to provide a better user experience in their… Read More The post useTransition and useDeferredValue in React 18 appeared first on The Armchair Critic.
You might come across id token validation issues in the Wso2 Identity Server 5.11.0. This article discusses possible fixes. … Read More The post Fix invalid id token issue in WSO2 Identity Server 5.11.0 appeared first on The Armchair Critic.
Passwords are becoming obsolete, and the tech world is exploring various different technologies to allow users to log in without passwords. In this article, we discussed the perils of passwords and how FIDO2 can help us go… Read More The post Magic link authentication using Asgardeo appeared first on The Armchair Critic.
Implementing a timer using React might seem straightforward until you actually try to implement one. This seemingly run-of-the-mill task can put your React knowledge to a stern test. The obvious way First, let us try… Read More The post Implementing a timer using React appeared first on The Armchair Critic.
Browser redirection is an integral part of the Open ID Connect (OIDC) authentication flow. At the same time, it is every UX engineer’s nightmare. Of course, we can do nothing to carry out OIDC authentication… Read More The post Reauthenticating a user without redirection in OIDC appeared first on The Armchair Critic.
In the previous article, we found the probability of double-spending. In this article, let’s look at the probability of an attacker mining a certain number of blocks with a hash rate of less than 50%.… Read More The post Probability of an attacker mining a certain number of blocks appeared first on The Armchair Critic.
In this article, we talk about block structure in blockchain, the block header and how we generate the Merkle root.… Read More The post Block structure in blockchain appeared first on The Armchair Critic.
Times change fast. Even more so if you are in the tech business. Fifteen years ago, JavaScript was only a child’s toy condemned to lend some semblance of programmability to web pages. Today, it is… Read More The post What I learned building a cloud-native frontend app for Asgardeo appeared first on The Armchair Critic.
Python's Async IO has made writing concurrent applications a breeze. This article explores how Async IO can be used to achieve concurrency in Python.… Read More The post Concurrent programming using Python’s Async IO appeared first on The Armchair Critic.
We tried to understand the 51% attack through the gambler’s ruin problem and the probability of a gambler winning T dollars in the last article. Let’s look at how we can apply the equation we… Read More The post 51% attack: Probability of double spending appeared first on The Armchair Critic.
In the previous article, we discussed hashing, asymmetric encryption, and digital signatures. In this article, we will dwell on how blockchain transactions work. An easier way to learn how blockchain transactions work is by following… Read More The post Understanding blockchain transactions appeared first on The Armchair Critic.
Network Function Virtualization (NFV) is the latest chapter in computer networks that tries to solve some of the pressing concerns with traditional networks. What is NFV and why is it all the rage? How does… Read More The post What is Network Function Virtualization (NFV)? appeared first on The Armchair Critic.
Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in detail. To begin with, CIAM... Continue Reading → The post How does CIAM differ from IAM? appeared first on The Armchair Critic.
Non-Dominated Sorting Genetic Algorithm II (NSGA II) is an evolutionary algorithm, which we use in multi-objective optimization scenarios. This article dwells on the nuts and bolts of the NSGA II algorithm while providing a brief… Read More The post NSGA II: Non-Dominated Sorting Genetic Algorithm II appeared first on The Armchair Critic.
GitHub Actions has made CICD easy. Couple it with the free hosting service offered by Firebase, you have a fully functional CICD pipeline ready for your frontend app completely free in no time. As frontend… Read More The post CICD for frontend with Firebase and GitHub Actions appeared first on The Armchair Critic.
Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app on your mobile phone. But have you ever wondered how an online service is able… Read More The post How does TOTP authentication work? appeared first on The Armchair Critic.