PinnedAdisesha Reddy GApplication Security for Developers‘There are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked.’ — John Chambers, Cisco…Jul 23, 20231Jul 23, 20231
PinnedAdisesha Reddy GDive into AirbyteAirbyte is a popular ELT tool in the Data Engineering community. The purpose of the post is to dive into some of the internals of Airbyte…Apr 23, 20231Apr 23, 20231
PinnedAdisesha Reddy GLeveraging ChatGPT and LangChain to Enhance Recruitment: A POCMore often than not, you would have got an initial screening call from a recruiter whose questions could have been more precise about what…Mar 19, 20231Mar 19, 20231
Adisesha Reddy GIntroduction to Kotlin for TypeScript ProgrammersI have experience in coding in Kotlin and TypeScript. If you look at the syntax, the two languages look so familiar that it is easy to pick…May 30, 20231May 30, 20231
Adisesha Reddy GMan-Computer Symbiosis: Unraveling J.C.R. Licklider's VisionI finished reading Mitchell Waldrop's book, 'The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal.' This…Apr 1, 2023Apr 1, 2023
Adisesha Reddy GThe cost of Spring Auto-configuration and Boot startersSpring Auto-configuration and Boot starters help shorten bootstrap application time and simplify configuration. The convenience comes at a…Mar 26, 2023Mar 26, 2023
Adisesha Reddy GNotes on Firebase’s push IDsI came across Firbase Push Ids while developing ReadyBee app. Since then, it’s been my go-to method for generating unique String ids. I…Feb 27, 2023Feb 27, 2023
Adisesha Reddy GJWT signature with AWS KMSThis post explains how you can generate a JWT signature using keys managed by AWS KMS. If you like to see the code first, head to…Feb 19, 20232Feb 19, 20232