Clyde D'CruzinCoinmonksWhat really is a crypto token?Even though the term token is widely used in computer science literature, tech blogs and news, its usage is quite inconsistent and…Mar 31, 2022Mar 31, 2022
Clyde D'CruzCorda backchain verification explainedCorda does not need every node in the network to hold a copy of the entire ledger like how nodes of some blockchain technologies do. Nodes…Jun 28, 2021Jun 28, 2021
Clyde D'CruzIs crypto currency?Historically, money has taken various forms like cocoa beans, cowrie shells, metal coins, playing cards etc. With the Bitcoin experiment…Mar 30, 2021Mar 30, 2021
Clyde D'CruzGeth’s insecure unlockThe Ethereum ecosystem is rapidly changing. Being open source software, a lot of improvements can pour in every year. A side effect of…Oct 9, 2020Oct 9, 2020
Clyde D'CruzA dive into SoftHSMA Hardware Secure Module (HSM) is a physical device that attaches directly to a computer or server and is used to securely manage and…Apr 27, 20203Apr 27, 20203
Clyde D'CruzBatching database writes in SpringNot long ago I was working on improving the performance of a Spring Boot application. A Spring Boot app that uses Spring Data JPA. Since…Mar 24, 2020Mar 24, 2020