What is a Hash? Hashing algorithms and the secrets they keep.

Hash A hash is a one-way function that maps data of any arbitrary length to an output digest of fixed length, where it is computationally infeasible to find the input from the output. The values returned by a hash function are often known as Message digest, hash values, hash codes, hash sums, checksums, or simply hashes. Hash functions are keyless and provide the data integrity service. They are usually built using iterated and dedicated hash function construction techniques. A hash function compresses data to a fixed size, which could be considered a shortened reference to the original data. The hash function should be easy to compute but hard to invert for compression, hash functions usually utilize a one-way function of number theory; hence, they are irreversible. Consequently, it is infeasible to reconstruct specific data when a hash value is known. A hash is a one-way function because it cannot be reversed. We can think of a hash as a digital fingerprint of data that is input into it. These types of hash functions are used in many ways. They can be used for authentication, indexing data into hashed tables, checksums, and digital signatures. An example of an SHA256 hash looks like this, 4UsOw2gKuwzwFpY2UH8cDnfMOqHM7Gv5XZBFxDnV4Ww. ...

July 1, 2017 · (updated February 5, 2024) · 9 min · Pradeep Loganathan
asp.net core framework lifecycle

ASP.NET Core framework lifecycle.

A lifecycle encompasses how a web application handles incoming requests, processes them, and generates responses. It is fundamental for developing efficient, scalable, and maintainable web applications

May 31, 2017 · (updated February 5, 2024) · 10 min · Pradeep Loganathan
AWS CloudFormation

AWS CloudFormation

AWS CloudFormation is an IaC tool for creating AWS resources in a declarative way.

May 30, 2017 · (updated February 5, 2024) · 6 min · Pradeep Loganathan

Startup VLog - Week 1

As promised last week, I am publishing the first week 1 roundup of my vlog. As I started off my initial focus was on product planning, market analysis, architecture, road map discussions etc. All of this was blown away very soon by the nuts and bolts of running a small organization with zero support. I ran headlong into red tape in registering the company which took a few days to get sorted out. I had to understand terms like Memorandum of Association (MOA), Article of Association (AOA) and many others. Post this was bank work and some more legal documentation. ...

May 28, 2017 · (updated January 16, 2022) · 2 min · Pradeep Loganathan

Video logging my startup journey.

Some of the folks who know me closely know that I recently quit my job at Dell and have started to work on building out my startup. Like any new-born it requires a lot of TLC and takes a lot of my time and energy but it is very exhilarating to start on a fresh new canvas. It has been a huge decision to leave a well-paying , stable and long-term association with Dell and invest Money, time and energy into starting out from scratch. As people have come to grips with my decision , I have been fortunate to receive lots of support and encouragement from my colleagues and friends. As I pick my way across this intriguing path, I am planning to video log every week so that I can share it with folks across and also create a self-reference for me to check back on. ...

May 22, 2017 · (updated January 16, 2022) · 2 min · Pradeep Loganathan

OAuth2

OAuth2 is an open authorization standard designed to provide an authentication and authorization protocol for the web.OAuth 2 was created with the intention of providing a way to grant limited access to protected content hosted by third-party services in a standardized and open manner.

March 11, 2017 · (updated December 5, 2023) · 4 min · Pradeep Loganathan
Representational State Transfer - REST

REST - Identifying Resources and URI design.

The key parts of a Resource oriented architecture (REST architecture) are resources, identifiers, representations, and the links between them. There is no exact science to identifying resources and there is no right or wrong with resources identified.In this post we will look at best practices to do so.

December 14, 2016 · (updated December 25, 2023) · 5 min · Pradeep Loganathan

Handling common input validation - Guard.cs

A fairly simple but common task across all application code that I have written is simple validation of parameters and inputs. Everybody has thier own way of handling this and here is mine. Can I do it better? You Bet. View this gist on GitHub

October 25, 2016 · (updated January 16, 2022) · 1 min · Pradeep Loganathan

Richardson's Maturity Model

Richardson’s Maturity Model breaks down the journey towards building a truly RESTful API into levels, each adding more constraints and adhering more closely to REST principles.

October 21, 2016 · (updated February 5, 2024) · 3 min · Pradeep Loganathan
Rest - Idempotency and Safety

Rest - Idempotency and Safety

Implementing the REST architectural principles results in the both Idempotency and safety being incorporated into the system. This is not however not completely automatic and needs to be thought through in detail.

October 19, 2016 · (updated February 5, 2024) · 7 min · Pradeep Loganathan