Software Engineering .NET Disposable Pattern Guidelines - How Good Are They? After having to look into the recommended way of implementing the Disposable pattern in .NET/C#, there's a lot about it I find non-optimal. Ranging from the philosophical to actual implementation decisions.
Crypto The case for something new in the crypto credit space DeFi was developed to make credit markets more transparent in the crypto space, but its drawbacks, high-fees and high impact security vulnerabilities, are quite severe. This is the beginning of a proposal for a transparent-yet-centralized credit platform.
Software Engineering Surgically upgrading yarn managed Javascript packages Upgrading just a single library in Javascript might appear to be a trivial task. But there are a few non-intuitive elements that make it a bit more complicated.
Personal Infrastructure Money with Privacy: Run your own Monero node Privacy is an overlooked feature in cryptocurrencies today. Monero makes privacy and confidentiality its priority. Running a node is key to guarantee that - here's a simple way of doing it.
Crypto Market Making in Stellar 101: Fundamentals & Kelp Brief introduction to Market Making in Stellar. Main concepts in security markets and market making. The importance of fostering this activity in Stellar and introduction to Kelp.
Personal Infrastructure Share Your Thoughts: Setting Up a Blog Using Ansible and Ghost Owning the platform you use to express yourself is becoming more important in these times. Use this guide to setup a ghost blog using ansible.
Personal Infrastructure Structuring an Ansible Repo for Personal Infrastructure An approach on how to structure an Ansible repo to manage your personal infrastructure.
Opinion Taking Ownership of your Key Internet Services Decentralizing the internet and taking power away from the giants starts with you owning your key services. This is my approach to do it.
Software Engineering New project: backup-to-dropbox - Release 0.2.0 Version 0.2.0 of backup-to-dropbox has been released. New features include GPG encryption and PyPI installation.
Software Engineering Writing Maintainable Code Tips: API Models != Domain Models Using API models as your domain models in your business logic is not a good idea and leads to hard-to-maintain systems.
Personal Infrastructure Setting up a OpenVPN gateway using docker containers How to set up an OpenVPN node using docker with multiple services that are guaranteed to use the VPN. Leveraging Ansible to have it consistent and reproducible.
Personal Infrastructure IDEX Staking Node Ansible Role Description and motivation behind the development of the Ansible Role to setup an IDEX staking node.
Software Engineering Database transaction handling in C++ systems Architectural approach of a way to handle transactions in C++ systems. The approach aims to be as decoupled and non-invasive as possible.
Personal Infrastructure Syncing external hard-drive with Dropbox for backup Simple trick to run a secondary Dropbox daemon in Linux. Useful to generate alternative backups.
Software Engineering Setup NAT Network for QEMU in Mac OSX Step-by-step guide on setting up a bridged NAT network for QEMU in MacOS
Personal Infrastructure Free SSL: Using "Let's Encrypt" for TLS certificates in your website Quick and easy way of setting up Let's Encrypt to generate certificates for a site hosted by nginx.
Personal Infrastructure Setting up a VPN gateway in Ubuntu using LXC containers and OpenVPN Simple how-to for setting up a VPN gateway using LXC containers. Also covering the setup of a killswitch and a SOCKS5 proxy
Software Engineering How to set up your own MongoDB sharded cluster for development in one host Steps required to set up a MongoDB shared cluster environment in a single host in Linux.
Software Engineering Validating a SSL certificate in Python A way to perform SSL certificate validation in Python using PyOpenSSL and is multiplatform.
Programming Competitions Project Euler Problem 182 - Solved Solution to ProjectEuler's problem 182 in Python using a straight-forward approach together with public key cryptography properties.
Programming Competitions Project Euler Problem 142 - Solved Solution to ProjectEuler's problem 142 in Python by expression manipulation and brute-force.
Programming Competitions Project Euler Problem 129 - Solved Solution to ProjectEuler's problem 129 in Python using an efficient way to represent a repunit and modular exponentiation.
Programming Competitions Project Euler Problem 132 - Solved Solution to ProjectEuler's problem 132 in Python using an efficient way to represent a repunit and modular exponentiation.
Programming Competitions CodeJam 2009 - Qualification Round - (B)Watersheds - Solution Solution to CodeJam's 2009 Qualification Round problem B in Python using a straight forward approach.
Programming Competitions CodeJam 2009 - Qualification Round - (A)Alien Language - Solution Solution to CodeJams's 2009 Qualification round problem A in Python using a straight forward approach.