RSA encrypted messages that cannot be decrypted
Not all messages encrypted with the RSA algorithm can be decrypted. This post will show why this is possible and why it does not matter in practice. RSA in a nutshell RSA encryption starts by finding two large primes, p and q. These primes are kept secret, but their product n
Read moreCase Study: A SOLID Refactor in React
With TDD, Context, and HooksContinue reading on Better Programming »
Read moreWhy You Should Be Using Event Storming
A breakdown of the benefits of using Event Storming for solution design and a simple guide to facilitating your Event Storming workshopsContinue reading on Better Programming »
Read moreKarma: An ERC20-compatible Alternative Money on the Ethereum Blockchain
Karma is an ERC20-compatible alternative money on the Ethereum BlockchainHave you ever thought about how money is created? Well, typically, it is made out of nothing by banks. When someone takes out a loan, the bank adds the borrowed money to the amount already recorded in its database for the
Read moreHow to land the manager-to-IC pivot
The conventional metaphor for career success is a ladder, but there are a lot of problems with this narrative.
Read moreMaking TypeScript Truly “Strongly Typed”
How to control the “any” type to achieve ultimate type safetyImage generated using MidjourneyTypeScript claims to be a strongly typed programming language built on top of JavaScript, providing better tooling at any scale. However, TypeScript includes the any type, which can often sneak into a codebase implicitly and lead to a
Read moreDetecting LLM-Generated Texts
Is it possible to differentiate between what is written by a large language model and a human?Image generated by Stable DiffusionIt’s almost impossible to distinguish between human-written text and large language model (LLM) generated text. Given the potential chaos that can result from the spread of misinformation, fake news, phishing, and
Read moreThe D.E.N.N.I.S. System: Résumé Tips for Senior Devs
Swipe right on your dream jobContinue reading on Better Programming »
Read moreDebugging Embedded Rust
Setting up a debug workflow from scratchPhoto by Christopher Gower on UnsplashIn my last article, I explored what it’s like to code a simple IoT application for the ESP32 series using rust bindings for the ESP-IDF. This time, I wanted to dive deeper into an aspect I did not discuss: debugging, specifically
Read moreThe Career-Paths Trident
A model to help you decide on a career path to followPhoto by Kedar Gadge on UnsplashIn previous articles, I talked about personal growth plans for individual contributors and how we can help our team members achieve their goals.There’s an analogy I use with my team members before they commit to a career
Read more