<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Shubhang Gupta on Medium]]></title>
        <description><![CDATA[Stories by Shubhang Gupta on Medium]]></description>
        <link>https://medium.com/@guptashubhang2000?source=rss-fabd9c5ffa99------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*6DBrLnp4OXEYJZehu9JMDw.jpeg</url>
            <title>Stories by Shubhang Gupta on Medium</title>
            <link>https://medium.com/@guptashubhang2000?source=rss-fabd9c5ffa99------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 10:18:17 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@guptashubhang2000/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Stuxnet: When Malware Became a Missile]]></title>
            <link>https://medium.com/@guptashubhang2000/stuxnet-when-malware-became-a-missile-bc42f88ff8b5?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/bc42f88ff8b5</guid>
            <category><![CDATA[zero-day]]></category>
            <category><![CDATA[cyberwar]]></category>
            <category><![CDATA[cyberspace]]></category>
            <category><![CDATA[scada]]></category>
            <category><![CDATA[stuxnet]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Sun, 27 Jul 2025 14:18:32 GMT</pubDate>
            <atom:updated>2025-07-27T14:18:32.968Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*c3DFiF7tqFHx6KLhYwMO_w.png" /><figcaption>Stuxnet</figcaption></figure><p>In the ever-evolving landscape of warfare, the rules were rewritten not with guns or bombs, but with a few hundred kilobytes of malicious code. 💻🧬 In 2010, a cyberweapon later dubbed <strong>Stuxnet</strong> emerged from the shadows — targeted, precise, and devastating. It infiltrated Iran’s nuclear facilities without a single shot fired, marking the <strong>first known instance of malware causing physical destruction</strong> in the real world. 🔐🧨 This was not just a virus; it was a weapon engineered with surgical precision, igniting a global debate about the <strong>ethics, risks, and future of cyber warfare</strong>. What followed was a wake-up call to every government and organization on the planet: <strong>the battlefield has shifted, and the next war may be fought in silence — from behind a keyboard.</strong></p><blockquote><strong>The world has achieved brilliance without wisdom, power without conscience. Ours is a world of nuclear giants and ethical infants.</strong></blockquote><h3>1. Introduction: Code That Sabotages — The Dawn of Cyberwar</h3><p><strong>“How do you bomb a nuclear facility without ever dropping a bomb?”</strong></p><p>The answer emerged in the form of a few lines of code — <strong>Stuxnet</strong>, a self-replicating worm that slipped into Iran’s <strong>Natanz</strong> nuclear plant and caused uranium-enriching centrifuges to spin themselves to destruction. It was the first known <strong>cyber weapon</strong> that moved beyond screens and servers, breaching the physical world without firing a single missile.</p><p>Unveiled to the public in 2010, Stuxnet wasn’t just malware — it was a <strong>surgical digital strike</strong>. Designed with military precision, this worm altered how nations understood warfare and diplomacy. Its existence wasn’t revealed by spies or governments, but by a <strong>Belarusian antivirus analyst</strong> who stumbled upon the code during a routine client complaint.</p><p><strong>Stuxnet marked the beginning of cyberwarfare as a tool of statecraft</strong>, proving that lines of code can now destroy infrastructure just as effectively as conventional arms. It blurred the lines between espionage, sabotage, and outright acts of war — without leaving a smoking crater.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*T_NLoE2TUens_EvFCiqfyQ.png" /><figcaption>The Stuxnet Timeline</figcaption></figure><h3>2. Genesis &amp; Motivation</h3><ul><li>The origins of Stuxnet trace back to a classified mission codenamed <strong>Olympic Games</strong>, a <strong>US-Israeli cyber operation</strong> initiated under the Bush administration and extended by President Obama. The operation’s goal: <strong>impede Iran’s nuclear ambitions</strong> without resorting to kinetic warfare.</li><li>The Natanz facility was heavily fortified and <strong>air-gapped</strong> from the internet. Direct strikes were politically risky. Instead, Olympic Games introduced a <strong>covert alternative</strong>: insert a worm that would infiltrate the facility’s control systems, damage centrifuges, and delay Iran’s progress — all while maintaining plausible deniability.</li><li>Extensive testing at facilities like <strong>Fort Meade</strong> and <strong>Sandia Labs</strong> involved mock replicas of Iranian <strong>IR-1 and IR-2 centrifuges</strong>, validating the code’s effectiveness before deployment. The first successful live test convinced President Bush to green-light the operation — reportedly after seeing a shattered centrifuge rotor firsthand.</li></ul><h3>3. Technical Mastery: The Worm’s Architecture</h3><p>Stuxnet is considered a <strong>technical marvel in malware design</strong>, leveraging a multi-stage modular architecture to achieve its objectives with surgical precision.</p><h3>🛠️ Core Components:</h3><ol><li><strong>Propagation Module</strong>: Utilized <strong>four zero-day vulnerabilities</strong> in Microsoft Windows:</li></ol><ul><li>.LNK vulnerability (CVE-2010-2568): Auto-execution via shortcut files.</li><li><strong>Print spooler exploit</strong> (CVE-2010–2729): Network spreading.</li><li><strong>Privilege escalation</strong> (CVE-2010–2743 and CVE-2010–2744): Gain SYSTEM-level access.</li><li><strong>Task scheduler bug</strong>: Allow persistence post-infection.</li></ul><p><strong>2. Stolen Digital Certificates</strong>: The worm was signed with valid certificates stolen from <strong>Realtek</strong> and <strong>JMicron</strong> — two Taiwanese firms — to bypass Windows’ driver signature enforcement and maintain stealth.</p><p><strong>3. Command and Control (C2)</strong>:<br>While Stuxnet could report telemetry back to a remote server, the most critical functionality was <strong>autonomous</strong>. Once deployed, it required <strong>no external input</strong> — ideal for air-gapped targets.</p><p><strong>4. Target Identification Logic</strong>:</p><ul><li>Embedded logic scanned for <strong>Siemens Step7 PLC environments</strong>.</li><li>The payload only activated if the target matched a very specific hardware configuration: <strong>centrifuge control systems using frequency converters</strong> by <strong>Vacon (Finland)</strong> and <strong>Fararo Paya (Iran)</strong>.</li></ul><p><strong>5. Payload Module (Sabotage)</strong>:</p><ul><li>Modified the <strong>s7otbxdx.dll</strong> library used by Step7 software to <strong>inject rogue ladder logic</strong> into the PLC.</li><li>Altered rotor speeds from <strong>1,064 Hz → 1,410 Hz</strong>, then drastically down to <strong>2 Hz</strong>, destabilizing the physical structure.</li><li>Simultaneously fed <strong>fake telemetry</strong> to operators, displaying normal operating conditions in SCADA dashboards.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ToIycVKL9qQrUCUaP2Qh0w.png" /></figure><h3>🧬 Key Feature: Rootkit for PLCs</h3><p>Stuxnet embedded a <strong>rootkit not only on Windows systems but also on the PLCs themselves</strong>, a rarity in malware design. It <strong>intercepted read/write operations</strong>, masking unauthorized changes and delaying detection.</p><h3>4. Invasion Vector: Air‑gapped but vulnerable</h3><p>Although Natanz was <strong>not connected to the internet</strong>, the attackers understood that <strong>humans are the weakest link</strong> in any system. The worm exploited <strong>removable media vectors</strong>, specifically <strong>USB drives</strong> used by contractors and engineers to perform software updates or diagnostics on-site.</p><p>Attack Chain:</p><ol><li><strong>Initial Infection</strong>: Spread through infected USB sticks or infected laptops belonging to <strong>external contractors</strong> working with industrial control components.</li><li><strong>Lateral Movement</strong>: Once inside a network, it leveraged Windows exploits to <strong>replicate silently</strong> across shared drives, print spoolers, and SMB shares.</li><li><strong>Target Acquisition</strong>: Stuxnet remained dormant until it found a <strong>Siemens PLC controlling IR-1 centrifuges</strong> in a specific cascade configuration.</li><li><strong>Execution</strong>: Upon detecting the desired system state, the worm deployed its payload, <strong>initiating the centrifuge disruption sequence</strong> and simulating normal operation data to avoid human detection.</li></ol><h3>5. Detection and Analysis</h3><p>In <strong>mid-June 2010</strong>, the Belarusian security firm <strong>VirusBlokAda</strong> — typically obscure in the global infosec world — detected what appeared to be a routine Windows bug, but soon realized it was something far more complex: a worm exploiting a zero-day in the .LNK shortcut handling. The malware was reported to Microsoft on June 17 and dubbed initially <strong>Rootkit.Tmphider</strong></p><p>Microsoft formed a task force of 20–30 experts who conducted a <strong>rapid four-day deep dive</strong>, logging around forty staff-hours to understand and patch the LNK exploit, scheduler escalation flaw, XP keyboard layout exploit, and a print‑spooler vulnerability. The analysis revealed a coordinated multi-vector attack — indicative of state-level sophistication.</p><p>Meanwhile, <strong>Symantec</strong>, <strong>Kaspersky</strong>, and Ralph Langner independently dissected the malware, exposing its <strong>modular design</strong> and stealth PLC payload hidden in s7otbxdx.dll, directly embedded within Siemens Step‑7 SCADA software. The discovery sparked international coverage: <strong>Nature magazine</strong> pondered if this marked the beginning of true cyberwarfare.</p><h3>6. Impact &amp; Fallout</h3><ul><li><strong>Physical damage</strong>: Stuxnet disabled approximately <strong>1,000 IR-1 centrifuges</strong>, degrading about <strong>20% of Natanz’s operational capacity</strong>, as confirmed by IAEA satellite images and expert analyses.</li><li><strong>Global contagion</strong>: Over <strong>200,000 Windows systems</strong> were infected worldwide. While most infections were inert, only specific systems at Natanz triggered the sabotage sequence.</li><li><strong>Cyber arms escalation</strong>: In the wake of Stuxnet, new advanced malware variants like <strong>Flame</strong> (espionage) and <strong>Duqu</strong> (data exfiltration) emerged — some built using Stuxnet-derived codebases.</li><li><strong>US domestic concern</strong>: The Department of Homeland Security raised alarms to Congress about Stuxnet’s code being repurposed to target U.S. critical infrastructure like energy grids and water treatment plants.</li></ul><h3>7. Ethics, Strategy &amp; Evolution of Warfare</h3><ul><li><strong>Is it an act of war?</strong> Stuxnet bypassed kinetic weapons entirely — executing physical sabotage via malware. Under <strong>UN Charter Article 2(4)</strong>, such an intelligence-enabled cyber operation raises urgent questions about legal definitions of war and aggression.</li><li><strong>Strategic ambiguity</strong>: The operation blurred lines between espionage, sabotage, and warfare. The absence of casualties and the anonymity of attribution created a moral gray zone, allowing policymakers to exploit stealth while avoiding political blowback.</li><li><strong>Ethical quandaries</strong>: Global collateral infections, manipulation of symbols like digital certificates stolen with apparent insider access, and no transparency — all underscore the ethical challenges posed by advanced cyber operations.</li></ul><h3>8. Lessons &amp; Future Takeaways</h3><p><strong>Weaponizing ICS malware</strong>: Stuxnet proved that ICS and SCADA systems are high-value targets and can be weaponized with precision. It moved the ICS threat from academic theory to real-world capability.</p><p><strong>Defensive best practices</strong>:</p><ul><li><strong>Network segmentation</strong>: Separate ICS zones from general IT environments.</li><li><strong>Whitelisting and code signing</strong>: Enforce strict application control and certificate verification.</li><li><strong>SIEM and intrusion detection</strong>: Monitor anomalous behavior, DLL injections or rootkit attempts.</li><li><strong>Non-repudiable logging</strong>: Use audit trails and external logging for forensics.</li></ul><p><strong>Policy imperatives</strong>: Stuxnet highlights existential gaps in cyber norms, policy frameworks, and international law. Governments and organizations must build <strong>transparency, accountability, and treaty-based controls</strong> in cyberspace in line with arms control precedents to prevent uncontrolled escalation.</p><h3>9. Conclusion</h3><p>Stuxnet didn’t just disrupt centrifuges — it disrupted paradigms. 🌐 It changed the calculus of warfare, diplomacy, and security by weaponizing code to wreak physical effect. As novel threats emerge, the foundational question looms ever larger: <strong>Who controls this power — and under what oath or treaty?</strong></p><p>We must either accept cyber conflict as the new normal — or forge robust legal and ethical frameworks to govern it. The stakes have never been higher; the time to act is now.</p><h3><strong>Research Resources</strong></h3><p><a href="https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en"><strong>Symantec — Stuxnet Dossier</strong></a><strong> — </strong><em>The most comprehensive early technical analysis of Stuxnet, published by Symantec’s threat research team.</em></p><p><a href="https://www.langner.com/to-kill-a-centrifuge/"><strong>Langner Group — To Kill a Centrifuge</strong></a><strong> — </strong><em>A detailed insider-level breakdown of how Stuxnet attacked Iran’s nuclear centrifuges, written by Ralph Langner.</em></p><p><a href="https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/"><strong>Wired — “How Digital Detectives Deciphered Stuxnet”</strong></a><strong> — </strong><em>A narrative-driven explanation of how researchers uncovered the secrets of Stuxnet.</em></p><p><a href="https://spectrum.ieee.org/the-real-story-of-stuxnet"><strong>IEEE Spectrum — “The Real Story of Stuxnet”</strong></a><strong> — </strong><em>Covers the political, military, and technological ramifications of Stuxnet with clarity.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bc42f88ff8b5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How Tech Giants Achieve Real-Time Scalability: Netflix]]></title>
            <link>https://medium.com/@guptashubhang2000/how-tech-giants-achieve-real-time-scalability-netflix-ec8cb08a9cb4?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/ec8cb08a9cb4</guid>
            <category><![CDATA[aws]]></category>
            <category><![CDATA[microservices]]></category>
            <category><![CDATA[content-marketing]]></category>
            <category><![CDATA[netflix]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Sat, 07 Sep 2024 06:13:47 GMT</pubDate>
            <atom:updated>2024-09-07T06:13:47.617Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*a8yrfAZxf71QqOhFTwPwWw.jpeg" /></figure><p><strong>Introduction:</strong> In the digital age, success often comes with a unique challenge: scaling at lightning speed ⚡. For tech giants like Netflix, Amazon, and Google, handling millions of concurrent users isn’t just a goal — it’s a daily reality.</p><p>Picture this: It’s Friday night 🌙, and suddenly, millions of people decide it’s time for a movie marathon 🍿. How does Netflix ensure that everyone can stream their favorite shows without a hitch? That’s where real-time scalability comes into play 🎬.</p><p>Real-time scalability is the superhero power 🦸‍♀️ of the tech world, allowing systems to adapt instantaneously to fluctuating user demands. It’s what keeps your favorite apps running smoothly, whether there are a hundred users or a hundred million 📈.</p><p>In this blog, we’ll dive into the innovative strategies and cutting-edge technologies that enable tech behemoths to achieve this seemingly magical feat. From cloud computing to microservices architecture, we’ll explore the building blocks of scalability that keep our digital experiences seamless and uninterrupted 🔄.</p><p>Buckle up as we embark on this high-tech journey to uncover the secrets behind the scenes of your favorite platforms! 💻🌐</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*G_5FTgRZvskSG_ucEWKybQ.png" /></figure><h3>The Scalability Challenge 🏋️‍♂️</h3><p>Netflix, as a global streaming giant, faces monumental challenges in maintaining seamless service delivery. The platform must gracefully handle:</p><ol><li><strong>Traffic Spikes</strong> 📈: During peak hours or highly anticipated content releases, Netflix experiences massive surges in concurrent users. For instance, the release of “Stranger Things” Season 4 led to a record-breaking 286.79 million hours of viewing time in its first weekend! 🍿🔥</li><li><strong>Global Reach</strong> 🌎: With a presence in over 190 countries, Netflix must ensure low-latency content delivery across diverse geographical locations, each with its unique network infrastructure challenges.</li><li><strong>Device Diversity</strong> 📱💻📺: From smart TVs to mobile phones, Netflix supports over 14,000 device types, each requiring optimized video delivery.</li><li><strong>Content Variability</strong> 🎭📚: With a vast library of content, Netflix must efficiently manage the storage, transcoding, and delivery of millions of video assets.</li></ol><p>To tackle these challenges, Netflix has developed a sophisticated, cloud-native architecture leveraging various cutting-edge technologies and methodologies. Let’s dive in! 🏊‍♂️</p><h3>The Secret Weapons 🛠️</h3><h3>Load Balancing: Zuul and Ribbon 🏗️</h3><p>Netflix’s approach to load balancing is multi-faceted, utilizing both Zuul for edge routing and Ribbon for inter-service communication.</p><p><strong>Zuul</strong> 🚦: As Netflix’s cloud gateway, Zuul is responsible for:</p><ul><li>Dynamic Routing: Intelligently directing incoming requests to the appropriate backend clusters.</li><li>Security: Implementing authentication and authorization at the edge. 🔒</li><li>Monitoring: Providing insights into traffic patterns and potential issues. 👀</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*sx349BvhXelkiq3S0ISVnA.png" /><figcaption>Zuul Architecture</figcaption></figure><p><strong>Ribbon</strong> 🎗️: This Inter Process Communication (IPC) library is crucial for load balancing between microservices. Key features include:</p><ul><li>Client-Side Load Balancing: Distributing requests across multiple server instances.</li><li>Fault Tolerance: Automatically retrying failed requests on different servers. 🔄</li><li>Multiple Protocol Support: HTTP, TCP, UDP compatibility. 🤝</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1013/1*qT7iwBhdCUS1o43N7Z0wgw.png" /><figcaption>Zuul Working example</figcaption></figure><h3>Service Discovery: Eureka 🔍</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/720/1*3hnT5pWsdO4phWZ_y5_6Qw.png" /><figcaption>Eureka High Level Architecture</figcaption></figure><p>Eureka, Netflix’s service registry, is the backbone of their microservices architecture. Its primary functions include:</p><ol><li><strong>Service Registration</strong> 📝: When a new service instance comes online, it registers itself with Eureka.</li><li><strong>Service Discovery</strong> 🕵️‍♀️: Client services query Eureka to discover the network locations of service instances.</li><li><strong>Health Monitoring</strong> 💓: Eureka continuously checks the health of registered services.</li><li><strong>Self-Preservation Mode</strong> 🛡️: In cases of network partitions, Eureka enters a self-preservation mode to prevent mass de-registration of services.</li></ol><h3>Content Delivery Networks (CDNs) 🌐</h3><p>Netflix operates its own CDN called Open Connect, which is crucial for efficient content delivery. Key aspects include:</p><ol><li><strong>Edge Caching</strong> 📦: Popular content is cached at ISP locations, dramatically reducing backbone traffic.</li><li><strong>Predictive Caching</strong> 🔮: Netflix’s algorithms predict which content will be popular in specific regions.</li><li><strong>Adaptive Streaming</strong> 🌊: OCAs work in tandem with Netflix’s adaptive streaming technology.</li><li><strong>Global Distribution</strong> 🗺️: With over 1,000 OCA locations worldwide, Netflix ensures low-latency content delivery even in remote areas.</li><li><strong>How is the content organized? </strong>Every title is encoded in multiple formats, or <em>encoding profiles</em>. For example, some profiles may be used by iOS devices and others for a certain class of Smart TVs. There are video profiles, audio profiles, and profiles that contain subtitles.<br>Each audio and video profile is encoded into different levels of quality. For a given title, the higher the number of bits used to encode a second of content (bps), the higher the quality. Which bitrate you stream at depends on the quality of your network connection, the encoding profiles your device supports, the title itself, and the Netflix plan that you are subscribed to. Finally, we have audio profiles and subtitles available in multiple languages.</li></ol><p>So for each quadruple of (title, encoding profile, bitrate, language), they need to cache one or more files. As an example, for streaming one episode of “The Crown” Netflix store around 1,200 files!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/585/1*7SBDNM9vuLgEpT28Ywp13Q.png" /><figcaption>Content Delivery of “The Crown”</figcaption></figure><h3>Auto-Scaling ⚖️</h3><p>Netflix’s auto-scaling solution is built on top of Amazon Web Services (AWS) and incorporates several custom tools:</p><ol><li><strong>Scryer</strong> 🔮: Netflix’s in-house forecasting engine that predicts future resource needs.</li><li><strong>Asgard</strong> 🏰: A web interface for cloud management and deployment.</li><li><strong>Reactive Auto-Scaling</strong> 🎢: Considers application-specific metrics for scaling decisions.</li><li><strong>Chaos Engineering Integration</strong> 🐒: Netflix’s famous Chaos Monkey randomly terminates instances in production.</li></ol><h3>Microservices Architecture 🏗️</h3><p>While not explicitly mentioned in the outline, Netflix’s microservices architecture is fundamental to its scalability:</p><ol><li><strong>Service Independence</strong> 🏋️‍♀️: Each microservice is developed, deployed, and scaled independently.</li><li><strong>Polyglot Persistence</strong> 💾: Different services use the database best suited for their needs.</li><li><strong>Circuit Breakers</strong> 🔌: Netflix’s Hystrix library implements the circuit breaker pattern.</li><li><strong>API Gateway</strong> 🚪: The edge services act as an API gateway, providing a single entry point for all clients.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*p2fGjSqQyOxruddsvGueHQ.png" /></figure><h3>Real-Time Delivery 🚚💨</h3><p>Netflix employs several techniques to ensure smooth real-time content delivery:</p><ol><li><strong>Adaptive Bitrate Streaming (ABR)</strong> 🌈: Adjusts video quality in real-time based on the user’s available bandwidth.</li><li><strong>Per-Title Encoding</strong> 🎥: Optimizes encoding parameters for each title individually.</li><li><strong>Video Multi-Method Assessment Fusion (VMAF)</strong> 👁️: A video quality metric developed by Netflix.</li><li><strong>TCP BBR</strong> 🚄: Significantly improves throughput and reduces latency.</li><li><strong>QUICK</strong> ⚡: Netflix is actively experimenting with QUIC to further reduce connection establishment times.</li></ol><h3>Conclusion 🏁</h3><p>Netflix’s ability to deliver a seamless streaming experience to millions of users worldwide is thanks to a sophisticated combination of technologies and strategies 🎭🌟.</p><p>From intelligent load balancing and service discovery to innovative content delivery and adaptive streaming, each component plays a crucial role. The microservices architecture ensures flexibility, while tools like Zuul, Ribbon, and Eureka optimize resource utilization 🏗️🔧.</p><p>Netflix’s <strong>Open Connect CDN</strong> reduces latency by bringing content closer to users, and real-time delivery is further enhanced by adaptive bitrate streaming and state-of-the-art transport protocols. The auto-scaling system ensures Netflix can meet demand without over-provisioning 📈🔬.</p><p>By continuously innovating and open-sourcing many of their tools, Netflix not only maintains its streaming leadership but also contributes to the broader tech community 🌟🚀.</p><p>So the next time you’re binge-watching your favorite show, remember the incredible technology working behind the scenes to bring that content to your screen! 🍿📺🎉</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ec8cb08a9cb4" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Silicon Valley Meets the Paddy Field: Bridging the Tech Gap in Global Agriculture]]></title>
            <link>https://medium.com/@guptashubhang2000/silicon-valley-meets-the-paddy-field-bridging-the-tech-gap-in-global-agriculture-cf7cfd2c2849?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/cf7cfd2c2849</guid>
            <category><![CDATA[precision-agriculture]]></category>
            <category><![CDATA[smart-farming]]></category>
            <category><![CDATA[agriculture-technology]]></category>
            <category><![CDATA[iot]]></category>
            <category><![CDATA[farming]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Sun, 12 May 2024 13:53:59 GMT</pubDate>
            <atom:updated>2024-05-12T13:53:59.659Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pxNPFgQ4hnyPPyiA7GZPEQ.png" /></figure><p>The world’s agricultural landscape is a tapestry woven from tradition and innovation. On one hand, we have the idyllic image of the Indian farmer, tilling the land with generations-old techniques. On the other, we see the high-tech behemoths of American agriculture, wielding data and automation like precision weapons. 🌾💻</p><p>Agriculture has a significant impact on the development of agricultural nations. One-third of India’s GDP, and over 70% of its population, are dependent on agriculture. The nation’s development has frequently been impeded by agricultural problems. The only solution to this problem is smart agriculture, which modernizes the traditional farming techniques now in use. Based on a machine learning model’s analysis of the soil’s NPK value. The entire handling is centered on gathering data for usage by farmers and other collaborators. Farmers in the agriculture industry and IoT devices are increasingly bridging the digital divide. Intelligent greenhouses, which can have hydroponic and micro aquaponic systems, are another application for the Internet of Things. Intelligent greenhouses are becoming more prevalent in cities as they allow for the tracking of many components of fertilizer solutions and enhance plant growth, productivity, and quality. Future food production that is more environmentally friendly will increase output, and the environment will be safeguarded by using water wisely and maximizing inputs and treatments. Remote monitoring, decision-support tools, automatic irrigation systems, frost prevention, fertilizing, and other methods are all part of smart agriculture. IoT technology, which consists of hardware, intelligent software, integration platforms, monitoring strategies, operating systems, and cloud computing, enables these procedures. 🌐🌿</p><blockquote>Three quarters of the world’s poorest and most undernourished people live in rural areas in developing countries. Most of these women and men depend on small-scale agriculture for their livelihoods.</blockquote><p>These smallholders confront the challenges of poverty, hunger — and often conflict and climate change — on a daily basis with very limited resources. This blog dives into the stark differences between these approaches, explores the role of technology in bridging the gap, and proposes potential solutions for Indian farmers to thrive in the future.</p><p>Some of the main issues that might be present are:<br><strong>1. Climate Adversity:</strong> Smallholder cultivators and rural dwellers in developing nations bear the brunt of climate change repercussions. Erratic weather patterns, rising sea levels, and intensified droughts, storms, and floods strain the ecosystems upon which they rely.</p><p><strong>2. Inequality and Social Exclusion:</strong> In rural areas, intersecting forms of disparity often exacerbate poverty. For instance, impoverished rural women encounter unequal access to land, confining them to low-yield or low-remuneration economic activities and limiting their access to finance, technology, markets, and decision-making compared to men.</p><p><strong>3. Food Security and Nutritional Adequacy:</strong> The estimated 500 million smallholder farms in the developing world sustain the livelihoods of nearly two billion individuals. These smallholder farms contribute approximately 80 percent of the food produced in sub-Saharan Africa and parts of Asia.</p><p><strong>4. Land and Natural Resource Access:</strong> Natural resources are fundamental to the livelihoods of rural populations, serving as sources of sustenance, shelter, income, and cultural identity. Secure access to resources mitigates susceptibility to hunger and poverty, yet for many impoverished rural dwellers, access is increasingly threatened.</p><p><strong>5. Infrastructure Deficiencies:</strong> Economic growth in rural areas is often contingent upon well-planned and coordinated investments in local infrastructure. Consequently, the distance to markets and the lack of roads are central concerns for rural communities throughout the developing world.</p><p><strong>6. Research and Technological Limitations:</strong> Agriculture is exceedingly diverse and location-specific, necessitating technologies tailored to a range of agroecological conditions. Innovative crop production technologies largely stem from innovation systems developed in wealthy countries, which are not freely accessible to developing nations.</p><p><strong>7. Institutional and Governance Challenges:</strong> Impoverished rural populations rarely control the conditions that determine their livelihoods. Most are rendered powerless and unable to influence decisions affecting their lives, a condition closely linked to weak local governance, a lack of services, and the severely limited provision of public goods.</p><p><strong>8. Migratory Pressures and Community Instability:</strong> The global crisis of forced displacement has affected an unprecedented 65 million people worldwide. Forced displacement has a strong rural dimension, leading to the degradation of agricultural land and the collapse of food production in the areas left behind.</p><p><em>This blog dives into the stark differences between these approaches, explores the role of technology in bridging the gap, and proposes potential solutions for Indian farmers to thrive in the future.</em></p><p><strong>A Tale of Two Fields: Traditional vs. Tech-Driven Farming</strong></p><ul><li><strong>The Idyllic Indian Farmer:</strong><br> In India, agriculture is dominated by small-scale farms with an average landholding of less than 2 hectares. Farmers rely heavily on manual labor and time-tested practices, leading to lower yields and greater vulnerability to environmental factors.</li><li><strong>The Tech-Powered American Farm:</strong> In stark contrast, American agriculture boasts large-scale farms and cutting-edge technology. From precision agriculture with data-driven optimization to robots handling tasks like weeding and harvesting, American farms are at the forefront of innovation.</li></ul><p><strong>The Uneven Playing Field: A Lack of Government Support</strong></p><p>These disparities are further amplified by the contrasting levels of government support. The US offers significant farm subsidies, incentivizing technology adoption and production scaling. Additionally, the contract farming model prevalent in the US allows farmers to secure stable markets beforehand, reducing risk and encouraging investment in technology.</p><p>In India, government support for agriculture often falls short. Limited access to credit and infrastructure hinders modernization efforts.</p><h3><strong>Bridging the Gap: Empowering Indian Farmers for the Future</strong></h3><p>Bridging the tech gap in Indian agriculture requires a multifaceted approach:</p><ul><li><strong>Government Initiatives:</strong> Increased investment in rural infrastructure, improved access to credit, and targeted subsidies for adopting agricultural technologies can significantly empower Indian farmers.</li><li><strong>Public-Private Partnerships:</strong> Collaboration between government agencies, research institutions, and private companies can accelerate the development and dissemination of affordable agricultural technologies suitable for small-scale farms.</li><li><strong>Digital Literacy Programs:</strong> Equipping farmers with the skills to use digital tools and interpret data will be crucial for maximizing the benefits of technology.💼🔗</li></ul><p><strong>The Future of Agriculture: A Tech-Driven Landscape</strong></p><p>The future of agriculture is undeniably tech-driven. By embracing innovation and fostering a supportive ecosystem, India can empower its farmers to not only compete but thrive in the global agricultural landscape. The idyllic image of the Indian farmer tilling the land may persist, but the tools in their hands are poised to become far more sophisticated.🚀🌱</p><p>In India, government support for agriculture often falls short, with limited access to credit and infrastructure hindering modernization efforts.</p><h3>Future of Farming</h3><p><strong>Vertical Farming:</strong> In the context of Indian farming revolution, vertical farming holds promise as a sustainable solution to address challenges such as land scarcity, water shortages, and climate change. In vertical farming, crops are grown in vertically stacked layers, often indoors or in controlled environments, using techniques like hydroponics or aeroponics.<br>This method allows for year-round cultivation regardless of external weather conditions and significantly reduces water usage compared to traditional agriculture. In India, where land availability is a concern, vertical farming can be particularly beneficial as it maximizes space utilization, enabling urban areas to produce their own fresh produce locally. Moreover, vertical farming can help reduce transportation costs and carbon emissions associated with food distribution.<br>However, the adoption of vertical farming in India faces challenges such as high initial investment costs, energy requirements for indoor lighting and climate control, and the need for skilled labor. Nonetheless, with advancements in technology and increased awareness of the importance of sustainable food production, vertical farming holds immense potential to contribute to India’s farming revolution by providing fresh, locally grown produce and promoting food security.</p><p><strong>Lab-Grown Meat:</strong> Lab-grown meat, also known as cultured meat or clean meat, involves growing animal cells in a laboratory setting and harvesting them to produce meat products without the need for raising and slaughtering animals. In the context of Indian farming revolution, lab-grown meat presents opportunities to address various issues plaguing the traditional meat industry, such as environmental degradation, animal welfare concerns, and public health risks associated with antibiotic use in livestock.<br>Lab-grown meat production requires significantly less land, water, and resources compared to conventional meat production, making it more sustainable and environmentally friendly. Additionally, it eliminates the need for large-scale animal farming, reducing greenhouse gas emissions and mitigating the negative impacts of livestock agriculture on climate change.<br>In India, where the demand for meat is expected to rise due to population growth and changing dietary preferences, lab-grown meat could offer a viable alternative to conventional meat production. However, the technology is still in its early stages, and scalability and cost-effectiveness remain key challenges. Nonetheless, with continued research and development efforts, lab-grown meat has the potential to revolutionize the meat industry in India, offering consumers a more ethical, sustainable, and environmentally friendly source of protein.</p><h3>The Tech Revolution on the Farm: A Glimpse into the Future</h3><p><strong>Precision agriculture</strong> offers a powerful tool for Indian farmers. Imagine sensors monitoring soil moisture levels, allowing for targeted irrigation that saves water and optimizes crop growth. Drones equipped with multispectral cameras could identify areas of pest infestation or nutrient deficiency, enabling farmers to take targeted action.</p><p><strong>AI</strong> can revolutionize decision-making by analyzing vast datasets on weather patterns, historical yields, and market trends, allowing farmers to optimize planting schedules, fertilizer application, and resource use.</p><p><strong>Agritech startups</strong> are developing innovative solutions specifically tailored to the needs of small-scale farmers. These startups are creating mobile apps that provide farmers with real-time weather data, market prices, and agricultural best practices.</p><ol><li>Mobile Apps for Crop Management: Develop user-friendly mobile applications providing farmers with valuable information on crop management techniques, weather forecasts, market prices, and pest control strategies.</li><li>Crowdsourced Pest and Disease Identification: Implement a platform for farmers to upload images of crop issues, analyzed by machine learning algorithms to offer real-time feedback and remedies, reducing losses.</li><li>Community Sensor Networks: Establish low-cost IoT-based sensor networks to monitor soil moisture, temperature, and humidity, enabling farmers to optimize irrigation schedules and improve crop yields through collaborative resource management.</li><li>SMS-based Advisory Services: Launch personalized SMS-based advisory services delivering recommendations on planting techniques, fertilizer application, and pest management strategies based on location, crop type, and cultivation stage, reaching a wide audience without requiring smartphones or internet access.</li><li>Solar-Powered Irrigation Systems: Install autonomous solar-powered irrigation systems in areas with unreliable electricity, providing farmers with a sustainable water source without costly diesel generators or grid connections.</li><li>Drone Technology for Crop Monitoring: Introduce drones equipped with cameras and multispectral sensors for high-resolution aerial surveillance of crops, detecting diseases, pests, and assessing irrigation effectiveness. Collaborate with local organizations or government agencies for affordable drone services.</li><li>Open Data Platforms: Create open data platforms aggregating information from weather stations, market prices, and research institutions, freely accessible to farmers, extension workers, and policymakers, supporting informed decision-making and transparency in agriculture.</li><li>Livestock Monitoring Wearables: Develop affordable wearable devices for livestock monitoring vital signs, activity levels, and GPS location, aiding in early illness detection and optimizing feeding and grazing practices.</li><li>Field Monitoring Redefined: Utilize agricultural drones and satellite imagery for accurate field monitoring, detecting crop diseases, and enhancing yields.</li><li>Connecting Farmers to Markets: Facilitate direct connections between farmers and buyers through e-commerce platforms and mobile apps, expanding market reach and income potential.</li><li>Towards Sustainability: Drive a shift towards sustainable, profitable agriculture with technology, ensuring food security and environmental preservation.</li><li>Precision Farming: Implement GPS mapping and automated machinery control for efficient resource utilization and maximized yields.</li><li>Empowering Farmers: Provide access to agricultural information through mobile apps and online platforms, benefiting small-scale farmers.</li><li>Democratization of Information: Bridge the digital divide, ensuring equal access to agricultural success for all farmers.</li><li>Artificial Intelligence (AI) and Machine Learning (ML): AI and ML can be used to develop predictive models for crop yield, disease detection, and pest management based on historical data and real-time inputs. Computer vision and image recognition techniques can be employed for automated crop monitoring, weed detection, and disease identification.</li><li>Robotics and Automation: Robotic systems can be used for automated tasks like seeding, harvesting, pruning, and spraying, reducing labor requirements and increasing efficiency. Automated sorting and grading systems can ensure consistent quality control and better market prices for produce.</li><li>Blockchain Technology: Blockchain can provide transparency and traceability in the agricultural supply chain, enabling farmers to track their produce from farm to market. Smart contracts on the blockchain can facilitate secure and efficient transactions between farmers, buyers, and other stakeholders.</li><li>Remote Sensing and GIS: Satellite imagery and remote sensing data can be used for mapping soil characteristics, identifying suitable crop areas, and monitoring crop health over large areas. Geographic Information Systems (GIS) can integrate various spatial data sources to aid in precision agriculture practices and farm planning.</li><li>Big Data Analytics: Collecting and analyzing large datasets from various sources (sensors, weather stations, market data, etc.) can provide valuable insights for optimizing farm operations, predicting market trends, and making data-driven decisions.</li><li>Cloud Computing: Cloud-based platforms can provide farmers with access to powerful computing resources, data storage, and analytics tools without the need for expensive local infrastructure. These platforms can also facilitate seamless data sharing and collaboration among stakeholders.</li><li>Augmented Reality (AR) and Virtual Reality (VR): AR and VR technologies can be used for training and education purposes, providing immersive experiences to learn about new farming techniques, machinery operation, and best practices.</li><li>Internet of Things (IoT) and Smart Farming: Advanced IoT systems can integrate various sensors, devices, and systems for real-time monitoring and control of farm operations, including irrigation, climate control, and livestock management. Smart farming solutions can automate and optimize various processes based on sensor data, reducing manual intervention and increasing efficiency.</li><li>Digital Marketplaces and E-commerce: Online platforms and e-commerce solutions can connect farmers directly with buyers, enabling them to access wider markets and potentially fetch better prices for their produce.</li><li>Agri-Fintech Solutions: Financial technology (fintech) solutions tailored for agriculture can provide farmers with access to digital payment systems, microfinance, insurance, and other financial services, empowering them to manage their finances more effectively.</li></ol><p>The future of agriculture is a tech-driven one. By embracing innovation and fostering a supportive ecosystem, India can empower its farmers to not only compete but thrive in the global agricultural landscape. While the idyllic image of the Indian farmer tilling the land may persist, the tools in their hands are poised to become far more sophisticated.<br>The stark contrast between American and Indian agriculture is a microcosm of the global divide between technologically advanced and traditional farming systems. While American agriculture has embraced precision farming and cutting-edge technologies, Indian agriculture remains rooted in centuries-old practices, a testament to the resilience and resourcefulness of small-scale cultivators. As the world confronts the challenges of feeding a growing population sustainably, bridging this divide and fostering knowledge-sharing between these two approaches will be crucial in shaping the future of global agriculture.</p><h3>Current Indian Government schemes to support Kisans</h3><p><strong>Financial Support Schemes:</strong></p><ul><li><strong>Pradhan Mantri Kisan Samman Nidhi (PM-KISAN):</strong> This scheme provides an income supplement of ₹6,000 per year in three installments to small and marginal farmers.</li><li><strong>Pradhan Mantri Kisan Maan Dhan Yojana (PM-KMY):</strong> This voluntary pension scheme enables small and marginal farmers to receive a monthly pension after the age of 60 by contributing to a pension fund.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uyWnbLKMSsfp4IP0Qd39YQ.png" /></figure><p><strong>Technology Adoption Initiatives:</strong></p><ul><li><strong>Soil Health Card Scheme:</strong> This scheme provides farmers with soil health cards containing crucial information on nutrient deficiencies, allowing for targeted fertilizer application.</li><li><strong>National Mission on Agriculture Extension and Technology (NMAET):</strong> This mission focuses on promoting the adoption of agricultural technologies among farmers through extension services and training programs.</li><li><strong>Krishi UDAN (Ude Deshka Ka Aam Nagrik):</strong> This scheme aims to improve air transportation for agricultural products, connecting farm clusters to national and international markets.</li><li><strong>Paramparagat Krishi Vikas Yojana (PKVY):</strong> This scheme promotes organic farming practices by providing financial assistance for certification, infrastructure development, and marketing of organic produce.</li><li><strong>Pradhan Mantri Krishi Sinchai Yojana (PMKSY):</strong> This scheme focuses on micro-irrigation initiatives like drip and sprinkler irrigation to improve water use efficiency.</li><li><strong>Market Access Initiatives:</strong> Government programs like eNAM (National Agriculture Market) aim to connect farmers electronically to national markets, improving price realization and reducing post-harvest losses.</li></ul><p><strong>Skill Development and Capacity Building:</strong></p><ul><li><strong>Sub-Mission on Agricultural Extension (SMAE):</strong> This sub-mission focuses on training farmers in various aspects of smart agriculture, including precision farming techniques, use of farm machinery, and post-harvest management.</li><li><strong>Farmers’ Training Programme (FTP):</strong> This program provides training to farmers on various agricultural topics like improved crop production practices, integrated pest management, and water management.</li></ul><p><strong>Risk Mitigation and Insurance:</strong></p><ul><li><strong>Pradhan Mantri Fasal Bima Yojana (PMFBY):</strong> This scheme provides subsidized crop insurance to farmers against losses arising from natural calamities, preventing financial hardship.</li><li><strong>Pradhan Mantri Krishi Sinchai Santhan Yojana (PMKSSY):</strong> This scheme aims to provide financial assistance to states for repair, renovation, and restoration of water bodies, mitigating drought risks.</li></ul><p><strong>Market Infrastructure and Marketing Support:</strong></p><ul><li><strong>Scheme for Strengthening of Marketing Infrastructure for Agriculture and Processed Food (SMIF):</strong> This scheme provides financial assistance for establishment of infrastructure facilities like grading, sorting, and packing units, improving market access for farmers.</li><li><strong>Operation Greens:</strong> This initiative focuses on reducing post-harvest losses and improving the income of farmers by integrating them into the organized value chain of fruits and vegetables.</li></ul><p><strong>Livestock and Fisheries Development:</strong></p><ul><li><strong>National Livestock Mission (NLM):</strong> This mission aims to improve livestock productivity, enhance milk production, and empower livestock farmers.</li><li><strong>Blue Revolution:</strong> This initiative focuses on development of the fisheries sector through infrastructure development, financial assistance for fish cultivation, and creation of markets for fisheries products.</li></ul><p><strong>Organic Farming and Sustainability:</strong></p><ul><li><strong>Mission Organic Value Chain Development in North East Region (MOVCDNER):</strong> This mission promotes organic farming in the North Eastern states of India by providing financial assistance for certification, infrastructure development, and marketing of organic produce.</li><li><strong>Rashtriya Krishi Vikas Yojana (RKVY):</strong> This scheme provides financial assistance for various agricultural development initiatives, including organic farming promotion and adoption of climate-resilient practices.</li></ul><p>These are just a few examples, and there are many other initiatives available depending on the specific needs of the farmers. It’s recommended to explore the websites of the Ministry of Agriculture &amp; Farmers Welfare (MoA&amp;FW) <a href="https://agriwelfare.gov.in/">https://agriwelfare.gov.in/</a> and relevant state government departments for the latest programs and eligibility criteria.</p><p><strong>Additional Resources:</strong></p><ul><li><strong>Vertical Farming:</strong> “<a href="https://artechno-growsystems.com/news/the-scoop-on-vertical-farming-systems">https://artechno-growsystems.com/news/the-scoop-on-vertical-farming-systems</a>&quot;</li><li><strong>Lab-Grown Meat:</strong> “<a href="https://ojs.qiu.edu.my/journal/index.php/qijmhs/article/view/48">https://ojs.qiu.edu.my/journal/index.php/qijmhs/article/view/48</a>&quot;</li><li><strong>US Department of Agriculture (USDA):</strong> “<a href="https://www.usda.gov/">https://www.usda.gov/</a>&quot;</li><li><strong>Indian Council of Agricultural Research (ICAR):</strong> “<a href="https://www.icar.org.in/">https://www.icar.org.in/</a>&quot;</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cf7cfd2c2849" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Code in Comfort: Top VS Code Themes]]></title>
            <link>https://medium.com/@guptashubhang2000/code-in-comfort-top-vs-code-themes-aa1bc698761b?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/aa1bc698761b</guid>
            <category><![CDATA[coding]]></category>
            <category><![CDATA[github]]></category>
            <category><![CDATA[dark-theme]]></category>
            <category><![CDATA[react]]></category>
            <category><![CDATA[vscode]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Sat, 09 Mar 2024 08:49:16 GMT</pubDate>
            <atom:updated>2024-03-09T08:49:16.096Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9tFcEIV9TQW23PW5OcAnsA.png" /><figcaption>Trending Themes: Code in Comfort</figcaption></figure><p>As a developer, you know that your coding environment can make a huge difference in your productivity and focus, it acts as your digital canvas. Whether you’re working on a complex software project or a simple coding task, having the right VS Code theme can help you stay organized, efficient, and inspired. While many developers prefer dark themes, there are a multitude of other options available that can help you customize your workspace to fit your preferences and needs.</p><blockquote><strong>“I use the Dark theme when coding, <br>because light attracts bugs.”</strong></blockquote><h3>The Power of Themes</h3><p>From sleek, minimalist themes to vibrant, eye-catching ones, there’s something for everyone. But with so many options out there, it can be hard to know where to start. That’s why we’ve compiled a list of the top Visual Studio Code themes every developer needs to try.</p><p>Beyond aesthetics ✨, themes can provide several benefits:</p><ul><li><strong>Reduced Eye Strain:</strong> Dark themes, in particular, can lessen eye fatigue during extended coding sessions.</li><li><strong>Enhanced Readability:</strong> Well-designed themes offer distinct color palettes for code elements, improving syntax highlighting and clarity.</li><li><strong>Personalization:</strong> Themes allow you to tailor your workspace to your taste, fostering a sense of ownership and comfort.</li></ul><h3><strong>VS Code Theme Navigation: A Guided Tour</strong></h3><p>Here’s how to effortlessly change your theme in VS Code:</p><ol><li><strong>Open the Command Palette:</strong> Press Ctrl+Shift+P (Windows/Linux) or Cmd+Shift+P (macOS).</li><li><strong>Search for Themes:</strong> Type “Color Theme” in the Command Palette search bar.</li><li><strong>Select the appropriate choice:</strong> From the list of options select “Browse Color Themes from marketplace” ➡️</li><li>A long list of amazing themes will appear.</li><li><strong>Browse or Search:</strong> Explore the curated list of themes or use the search function to find specific themes by name.</li></ol><p>Here is a list of some of the best themes for your IDE.</p><h3>1. One Dark Pro (Classic and Minimalistic)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*znqjqDPe22beBEZNavC3Hw.png" /></figure><p>You must have heard of the <em>ATOM</em> editor, which was one of the popular code editor, this theme is based on one of the iconic theme of the <em>ATOM</em>. The <a href="https://marketplace.visualstudio.com/items?itemName=zhuangtongfa.Material-theme">One Dark Pro</a> has a well-balanced color palette with a lower contrast between background and text. It features dark gray background with multiple options such as,</p><ul><li>One Dark Pro</li><li>One Dark Pro Darker</li><li>One Dark Pro Flat</li><li>One Dark Pro Mix</li></ul><p>It has 7.2+ Million installs and it is one of the popular theme of the visual studio marketplace. It is created by <strong>Binaryify</strong>. It also provides customization for different colors, bold or italic texts, option to enable or disable vivid colors.</p><p>One thing that I dislike about this theme is sometimes due to the gray background it becomes hard to see different color texts. For some users <strong>One Dark Pro</strong> can be overwhelming due to it’s dark color scheme and bold syntax highlighting. Overall this theme is an excellent choice if you like the dark modes.</p><h3>2. Dracula Official (Dark and Mysterious)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*b06Sgiv0SWvmTRWE1tVRRQ.png" /></figure><p>The <a href="https://draculatheme.com/">Dracula Official</a> theme is a popular theme for Visual Studio Code that features a purple background with a well-balanced color scheme. It is based on the popular Dracula color scheme, which has gained popularity among developers due to its vibrant yet soothing color palette. It provides two options</p><ul><li>Dracula</li><li>Dracula Soft</li></ul><p>The theme is easy on the eyes and provides excellent contrast for syntax highlighting. The Dracula Official theme has over 5+ million downloads on the Visual Studio Code Marketplace, indicating its popularity among developers.</p><p>However, some users may find the <strong>Dracula Official</strong> theme to be too bold or overwhelming due to its use of bright colors and high contrast. Additionally, the theme may not be suitable for those who prefer lighter themes or have trouble viewing bright colors on a dark background. Overall, the <strong>Dracula Official</strong> theme is an excellent choice for those who want a bold and vibrant theme with excellent syntax highlighting and customization options.</p><h3>3. GitHub Themes (Light and Dark options)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*g1Si7xWjTRrH57x2ssfm_A.png" /></figure><p>If you really like the design of the Github then this theme is for you. The <a href="https://marketplace.visualstudio.com/items?itemName=GitHub.github-vscode-theme">Github Theme</a> is inspired by popular code hosting platform called Github. It has combination of different light and dark theme options such as,</p><ul><li>Github Dark</li><li>Github Dark Colorblind</li><li>Github Dark Default</li><li>Github Dark Dimmed</li><li>Github Dark High Contrast</li><li>Github Light</li><li>Github Light Colorblind</li><li>Github Light Default</li><li>Github Light High Contrast</li></ul><p>This theme has over 8.4 million downloads on the Visual Studio Code Marketplace. If you are not a fan of dark mode then this theme has one of the best light theme options for VS code. It’s sleek and modern theme and has different shades of background such as blue, dark gray and white. This theme is a solid choice for developers who prefer lighter color schemes and a clean, minimalist design.</p><h3>4. Night Owl (Night coding savior)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mIMI2VA-sbgjjx8KVaI2VA.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=sdras.night-owl">Night Owl</a> theme is one of the best theme for low-light circumstances. It has unique design and it is easy on the eyes. This theme does not use much bright colors like “One Dark Pro” instead it uses muted colors with a background in the shade of blue. This theme is specially design for programmers who like to code at night. It has different options like,</p><ul><li>Night Owl</li><li>Night Owl (No Italics)</li><li>Night Owl Light</li><li>Night Owl Light (No Italics)</li></ul><p>It has over 1.9+ million downloads and it is recommended by many coding communities. It is created by Sarah Drasner. One thing I dislike about this theme is the Light version of this theme the background is white and the color of the syntax are not that dark enough so that you can’t easily read the syntax. Overall, It is a good choice for programmers who like dark mode and don’t want high contrast color for the code syntax.</p><h3>5. Ayu (Sleek and Elegant)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Z3LnnTzAkoJ-o_wR-tqzqw.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=teabyii.ayu">Ayu</a> is has 1.8+ million downloads on the VS code marketplace. It has a mix of light and dark thems. It is a simple, bright and elegant theme with different options such as,</p><ul><li>Ayu Dark</li><li>Ayu Dark Bordered</li><li>Ayu Light</li><li>Ayu Light Bordered</li><li>Ayu Mirage</li><li>Ayu Mirage Bordered</li></ul><p>It has really nice color combination for the Dark theme since It has high contrast colors for the syntax and darker background. The mirage version has fog like background so it is a little dimmer then the Dark version. The Light version is not that great since the ratio of syntax color and background color is not maintained enough. Overall this theme is good choice for developers who like high contrast color for syntax and darker background it also provides bordered or borderless options as well.</p><h3>6. Moonlight (Dark and Sophisticated)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*hdWIvECYsp2ux5fbTpJQdg.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=atomiks.moonlight">Moonlight</a> is one of my favourite theme. It is created by atomiks and It has over 132k downloads on VS code marketplace and 550+ stars on the github, The one thing I like about this theme is the soothing colors of the syntax that match with the background shade. It has also an option to change the syntax color to high contrast colors. It has different options such as,</p><ul><li>Moonlight</li><li>Moonlight II</li><li>Moonlight Italic</li><li>Moonlight II Italic</li></ul><p><strong>Moonlight</strong> theme may not be suitable for users who prefer high-contrast themes. Overall, it is a stylish and modern theme that’s easy on the eyes and offers great syntax highlighting and a unique look and feel, making it a great choice for developers.</p><h3>7. 2077 — A Futuristic Flair</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XPKfILtHni4WzY22QD7aPA.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=Endormi.2077-theme">2077</a> is best choice for developers who are looking for a futuristic and cyberpunk inspired theme. This theme is based on the popular game called “Cyberpunk 2077” and features dark background with neon like colors. It is created by Endormi. It does not has multiple options for now but It has 254k+ downloads on the VS code marketplace. Also, It has 5 out of 5 ratings as well.</p><p>This theme has very dark navy blue background and it has unique and bright colors which you can easily identify with each other. This theme is not for everyone, It can be overwhelming for developers who prefers more subtle colors. Overall it is a unique and bold theme that offers futuristic look to your code editor.</p><h3>8. Noctis (Light theme champion)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*32exEMWXgp2YF5OFopYbCw.png" /></figure><p>I found one of the best light theme from this collection. The <a href="https://marketplace.visualstudio.com/items?itemName=liviuschera.noctis">Noctis</a> is a collection of light and dark themes with a blend of warm and cold contrast colors. It features muted teal, blues, purples and gray colors. It has so many variants such as,</p><ul><li>Noctis</li><li>Noctis Azureus</li><li>Noctis Bordo</li><li>Noctis Hibernus</li><li>Noctis Lilac</li><li>Noctis Lux</li><li>Noctis Minimus</li><li>Noctis Obscuro</li><li>Noctis Sereno</li><li>Noctis Uva</li><li>Noctis Viola</li></ul><p>The <strong>Noctis</strong> has 800k+ downloads on the VS code marketplace and 440+ stars on the github. Overall this theme is a solid choice for developers who want clean, minimalist theme that’s easy on the eyes.</p><h3>9. Shades of Purple (For the purple passionate)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3uPJdlg1rf_o09iIgZbXUg.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=ahmadawais.shades-of-purple">Shades of Purple</a> is one of the popular themes for the VS code. It has over 1.4+ million downloads. You will definitely like this theme if you are a fan of purple color. As the name suggests it has purple background and has two options which are,</p><ul><li>Shades of Purple</li><li>Shades of Purple (Super Dark)</li></ul><p>It has high contrast syntax colors. This theme is created by Ahmad Awais and has 650+ github stars. The theme is quite bold, with a lot of contrast between the dark background and the text. If you prefer theme with the low contrast then this might be not suitable for you but overall this theme is unique with excellent syntax highlighting with bold colors.</p><h3>10. City Lights (Modern and Bright)</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dd2Lt5_YKKOUMTjBtrbVvg.png" /></figure><p>The <a href="https://marketplace.visualstudio.com/items?itemName=Yummygum.city-lights-theme">City Lights Theme</a> is created by yummygum design agency. It is a visually pleasing theme with the bright, colorful design with high contrast and bold typography. The color palette of this theme is really stands out from other themes. It has soothing light colors with not so high contrast. It does not provide many options but you must try this theme.</p><p>It has over 210k+ downloads on VS code marketplace and 4.9 out of 5 ratings. Overall, the City Lights theme is a great choice for developers who want a visually striking and modern theme with excellent syntax highlighting and customization options. However, it may not be suitable for everyone, so it’s worth trying out the theme to see if it works for your needs.</p><h3>Honorable mentions</h3><p><strong>Dark and Colorful Themes:</strong></p><ul><li><strong>Nord:</strong> Inspired by the Scandinavian aesthetic, Nord offers a balanced dark theme with calming blues, greens, and whites.</li><li><strong>Oceanic Next:</strong> Embrace the underwater world with Oceanic Next’s dark blue background and vibrant ocean-inspired color palette.</li><li><strong>Material Theme:</strong> Channel the clean Material Design principles with this theme, available in light and dark variations with soft, muted colors.</li></ul><p><strong>Light and Minimalist Themes:</strong></p><ul><li><strong>One Light Pro:</strong> The light counterpart to One Dark Pro, One Light Pro delivers a clean and minimalist light theme with excellent readability.</li><li><strong>Atom One Light:</strong> Another classic light theme, Atom One Light provides a bright white background with soft, non-glaring text colors for a clutter-free experience.</li><li><strong>Tokyo Night Storm:</strong> If you enjoy a subtle touch of color, Tokyo Night Storm presents a light theme with a light gray background and hints of blue for a calming effect.</li></ul><p><strong>Unique and Themed Options:</strong></p><ul><li><strong>SynthWave </strong>’84: Take a trip back to the 80s with SynthWave ‘84’s retro-inspired theme featuring neon colors and a dark background.</li><li><strong>Monokai Pro:</strong> This theme offers a distinctive look with a dark background, desaturated colors, and unique file and folder icons.</li><li><strong>Dracula Theme (Original):</strong> The original version of the Dracula theme provides a slightly different take on the popular color scheme, offering an alternative for those who prefer a touch of variation.</li></ul><h3>Conclusion</h3><p>Taming the digital jungle of your code editor is crucial for developer zen. Visual Studio Code offers a treasure trove of themes to transform your workspace into a haven of focus and productivity. Whether you crave the inky depths of dark themes, the crisp clarity of light options, or a splash of personality, there’s a theme waiting to unleash your coding potential.</p><p>From the ever-popular One Dark Pro to the sophisticated City Lights and the cyberpunk-infused 2077, each theme boasts unique strengths. Experiment and discover the perfect fit for your coding style. After all, a comfortable environment is the first step towards coding mastery. So, dive into the world of VS Code themes and create your ideal coding oasis!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=aa1bc698761b" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Instagram System Design Unraveled]]></title>
            <link>https://medium.com/tech-iiitg/instagram-system-design-unraveled-6af43bb5335e?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/6af43bb5335e</guid>
            <category><![CDATA[architecture]]></category>
            <category><![CDATA[meta]]></category>
            <category><![CDATA[instagram]]></category>
            <category><![CDATA[system-design-concepts]]></category>
            <category><![CDATA[computer-science]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Thu, 22 Feb 2024 05:55:25 GMT</pubDate>
            <atom:updated>2025-07-20T13:38:07.656Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_dQnWJ7tjQ9USRGrn0B7-Q.png" /></figure><p>In the realm of system design, where intricate acronyms like API, MVC, and CDN may initially seem like enigmatic jargon, we embark on a journey to unveil the complex architecture that powers Instagram. Brace yourself, for this is no casual stroll in the park. Designing a system akin to Instagram demands meticulous attention, akin to orchestrating a symphony 🎶 with a multitude of instruments 🎻, each with its unique role. Our approach here shall mirror that of a seasoned engineer, adeptly navigating the labyrinthine world of bytes and databases.</p><p>Imagine yourself as a novice explorer, armed with a willingness to learn 📚, yet bearing a perplexed expression rivaling that of a lost kitten 🐾. You delve into a few software architecture books, only to encounter terminology resembling a secret code 🤫 devised by a congregation of tech wizards 🧙‍♂️. You may start to wonder if you’ve inadvertently ventured into a parallel universe, where words such as “scalability” and “load balancing” are woven into the everyday lexicon. This blog, tailored for system design beginners, is designed to transform you into a Jedi Master 🌌 of system architecture, one step at a time. We shall initiate this journey by dissecting the system architecture that underpins Instagram.</p><p>Instagram, as you may already know, stands as a social media titan, offering users the platform to share their cherished moments in the form of photos and videos. It’s a realm where likes ❤️, hashtags #️⃣, and filters 📸 reign supreme. However, our objective is not to break the internet but to cultivate an understanding of system design. In this endeavor, we shall craft a simplified version of Instagram, envisioning it as the younger, mischievous sibling, eager to follow in its elder’s footsteps but still learning to tie its shoelaces.</p><p><strong>A Brief History</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*stB59XgefP6P9_nqx27vaw.jpeg" /></figure><p><strong>Birth and Humble Beginnings (2010):</strong></p><ul><li>Founded by Kevin Systrom and Mike Krieger in San Francisco.</li><li>Originally called <strong><em>Burbn</em></strong>, focusing on location check-ins and photo sharing.</li><li>Pivoted to focus solely on mobile photo sharing as “Instagram” (a mashup of “instant camera” and “telegram”).</li><li>Launched on iOS in October 2010, gaining 25,000 users on day one.</li><li>Rapidly gained popularity due to its simple interface, photo filters, and focus on mobile experience.</li></ul><p><strong>Rise to Popularity (2011–2012):</strong></p><ul><li>Reached 1 million users in less than two months, 10 million in a year.</li><li>Introduced Android app in April 2012, expanding reach significantly.</li><li>Became a cultural phenomenon, popularizing hashtags, influencer marketing, and visual storytelling.</li><li>Acquired by Facebook for $1 billion in April 2012, shortly before Facebook’s IPO.</li></ul><p><strong>Global Expansion and Scaling (2013-present):</strong></p><ul><li>Launched web interface in November 2013, followed by dedicated apps for Windows and Fire OS.</li><li>Introduced new features like Direct Messages (2013), Stories &amp; Live Video (2016), and Reels (2020).</li><li>Grew user base to over 2 billion monthly active users by 2022, becoming a top social media platform globally.</li><li>Faced challenges with data privacy, content moderation, and competition from TikTok.</li><li>Parent company Facebook rebranded as Meta in 2021, emphasizing metaverse development.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/981/1*bE9I4ul4qMkgimSjwaiHpA.png" /></figure><p>System Architecture</p><ol><li>Client-Side Application: Instagram predominantly operates on mobile devices 📱, equipped with native apps for iOS and Android, alongside a web version tailored for browsers. Users engage with Instagram through these client applications.</li><li>Load Balancers: Incoming user requests are directed to load balancers, entrusted with the responsibility of evenly distributing traffic across multiple servers. This load balancing strategy is pivotal in ensuring high availability and scalability.</li><li>Web Servers: Instagram’s web servers shoulder the burden of user authentication, profile rendering, and the delivery of web content. These servers proficiently employ web frameworks and technologies to process user requests and generate dynamic web pages.</li><li>API Servers: The API servers extend endpoints for client applications to interact with the platform. They manage actions such as posting photos, following users, liking posts, and retrieving user data, while also communicating with various backend services to fulfill these requests.</li><li>Content Delivery: Instagram harnesses the power of Content Delivery Networks (CDNs) to expeditiously serve media content, encompassing images and videos, to users. CDNs cache content at strategically positioned edge locations across the globe, substantially reducing latency and enhancing content delivery speed.</li><li>Databases: Instagram ingeniously employs a blend of relational and NoSQL databases to oversee its data. Relational databases such as MySQL or PostgreSQL handle structured data, including user profiles and comments. On the other hand, NoSQL databases like Cassandra or MongoDB are reserved for unstructured data, such as user-generated posts and media.</li><li>Caching Layer: To optimize system performance and alleviate the burden on databases, Instagram embraces caching mechanisms. Frequently accessed data, such as user profiles and recent posts, are diligently cached with the aid of technologies like Memcached or Redis.</li><li>Message Queues: Message queuing systems like Apache Kafka or RabbitMQ are the architects of asynchronous task management. These queues deftly handle background tasks, ranging from notifications and email delivery to processing user interactions.</li><li>Search and Discovery: Instagram boasts a robust search and discovery system, empowered by search engines like Elasticsearch. Users can embark on quests to discover accounts, hashtags, and locations, with the system furnishing relevant results.</li><li>Machine Learning: Machine learning algorithms assume a pivotal role in Instagram’s recommendation systems. These algorithms analyze user behavior and content, offering suggestions for posts, accounts to follow, and advertisements.</li><li>Content Moderation: Instagram harnesses the power of machine learning and image recognition algorithms for content moderation. These algorithms stand sentinel, diligently detecting and expunging inappropriate or harmful content from the platform.</li><li>Analytics and Reporting: Instagram bestows users and businesses with analytics and reporting features. Complex algorithms meticulously process user data, resulting in insights on post reach, engagement rates, and follower demographics.</li><li>Real-Time Features: Instagram caters to real-time features like direct messaging and live video streaming, necessitating real-time communication protocols and a robust infrastructure.</li><li>Security Measures: An array of security measures, including encryption 🔒, authentication, and access controls, are firmly in place to protect user data and ensure platform security.</li></ol><p><strong>📜 Business Requirements</strong></p><ol><li>Image Upload: Users should have the capability to upload images from their mobile devices 📸, with the system accommodating various image formats and sizes.</li><li>Like &amp; Comments: Users should be able to express appreciation through likes ❤️ and engage in discussions through comments 💬 on images. They must also have access to view likes and comments on images, and receive notifications when their images are appreciated or commented on.</li><li>Follow: Users should have the ability to follow other users 👥, and in turn, receive notifications when they are followed by fellow users.</li><li>News Feed: The system should generate a news feed of images 📰, expertly sorted based on relevancy and freshness.</li></ol><p><strong>Technical Requirements</strong></p><ol><li>The system should gracefully support image formats such as JPEG, PNG, and GIF.</li><li>The maximum permissible image size should not exceed 20MB.</li><li>The system must demonstrate robustness by accommodating at least 100,000 concurrent uploads.</li><li>Users should have the capacity to upload up to 10 images per day 🗓️, with a monthly limit capped at 500 images.</li><li>The system should efficiently manage at least 1 million concurrent likes and comments.</li><li>To cater to Instagram’s vast user base, the system should demonstrate its mettle by accommodating at least 1 billion registered users.</li><li>Users should be able to follow a minimum of 1,000 other users, fostering a rich and engaging social experience.</li></ol><p>Instagram imposes certain limits on user activity to safeguard the system from abuse and ensure a pleasant experience for all. While these limits may not affect regular users, business accounts, and social media influencers may need to be mindful of their activity. The limits for a single Instagram user are as follows:</p><ul><li>Posts: There is no official daily limit for posting photos or videos, including Reels. Based on user experiences and reports, regular users can typically post around 20–30 photos or videos per day without encountering issues.</li><li>Uploads: 10 images or videos per day</li><li>Likes: 1,000 likes per day</li><li>Comments: 1,000 comments per day</li><li>Follows: 1,000 follows per hour</li></ul><p><strong>UseCases<br>1. Upload a New Image:</strong></p><ul><li>When a user uploads a new image, the client sends a request to the Instagram server along with the image data.</li><li>The server receives the image data, processes it, and stores it in the appropriate storage system, such as Amazon S3 or a distributed file system.</li><li>Metadata about the image, such as caption, location, and user tags, is stored in a database like MySQL or a NoSQL database.</li><li>Once stored, the image is made accessible to the user’s followers and appears on the user’s profile.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*jAODsMDPT6L3osWn3GJtYA.png" /></figure><p><strong>2. Follow Another User:</strong></p><ul><li>To follow another user, the client sends a request to the server with the user ID or username of the target user.</li><li>The server updates the follower and following lists for both users in the database.</li><li>This relationship data allows Instagram to generate personalized feeds and notifications for both the follower and the user being followed.</li><li>When the user posts new content, it will appear in the feed of their followers, including the user who initiated the follow action.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IOU3VrarrYxvm4x4oDgmvA.png" /></figure><p><strong>3. Retrieve User News Feed:</strong></p><ul><li>When a user requests their news feed, the client sends a request to the Instagram server.</li><li>The server retrieves the list of users the requesting user follows from the database.</li><li>It then fetches recent posts and stories from those users and sorts them based on timestamps.</li><li>The sorted content is sent back to the client, where it is displayed in the user’s news feed.</li><li>Additionally, the system might use algorithms to personalize the feed based on user interactions, such as likes and comments.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RGasDnt2kCpSIUObfm6f5Q.png" /></figure><p>Exceeding any of these limits may result in an error message or a temporary account blockage.</p><p><strong>Instagram’s Daily Capacity</strong></p><ul><li>Maximum uploads per day: 10</li><li>Maximum likes per day: 1 million</li><li>Maximum likes per hour: 100,000</li><li>Maximum tags per day: 1,000</li><li>Maximum tags per hour: 100</li><li>Maximum comments per day: 1 million</li><li>Maximum comments per hour: 100,000</li><li>Maximum stories per day: Unlimited</li><li>Maximum concurrent users: 1 billion +</li><li>Maximum concurrent uploads: 100,000</li><li>Maximum concurrent likes and comments: 1 million</li></ul><p><strong>Current Status (2024):</strong></p><ul><li>Instagram remains a leading social media platform, but growth has slowed.</li><li>Focuses on features like Reels and shopping to compete with TikTok and e-commerce platforms.</li><li>Addresses concerns about data privacy and mental health with new initiatives and tools.</li><li>Plays a critical role in Meta’s overall strategy, although facing increasing regulatory scrutiny and competition.</li></ul><p><strong>Resources</strong>:<br><strong>Instagram Engineering Blog:</strong> <a href="https://instagram-engineering.com/"><em>https://instagram-engineering.com/</em></a> (articles on various aspects of Instagram’s infrastructure)<br><strong>Facebook Engineering Blog:</strong> <a href="https://engineering.fb.com/"><em>https://engineering.fb.com/</em></a> (articles on related technologies used by Facebook and potentially Instagram)</p><p><strong>Real-Time Features:<br>WebSockets:</strong> <a href="https://developer.mozilla.org/en-US/docs/Web/API/WebSocket"><em>https://developer.mozilla.org/en-US/docs/Web/API/WebSocket</em></a><em> </em>(MDN Web Docs)<br><strong>Server-Sent Events:</strong> <a href="https://developer.mozilla.org/en-US/docs/Web/API/Server-sent_events"><em>https://developer.mozilla.org/en-US/docs/Web/API/Server-sent_events</em></a> (MDN Web Docs)</p><p>From its inception in a small San Francisco office to its global influence as a cultural phenomenon, Instagram has redefined the way we connect, share, and experience the world. Through a symphony of technology and human interaction, it continues to evolve, adapting to new challenges and embracing the future of social networking.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6af43bb5335e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/tech-iiitg/instagram-system-design-unraveled-6af43bb5335e">Instagram System Design Unraveled</a> was originally published in <a href="https://medium.com/tech-iiitg">tech@iiit-gwalior</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The Triad of Cloud Security: Safeguarding Data at Rest, in Transit, and in Active Use]]></title>
            <link>https://medium.com/@guptashubhang2000/the-triad-of-cloud-security-safeguarding-data-at-rest-in-transit-and-in-active-use-d734e9ed4b2f?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/d734e9ed4b2f</guid>
            <category><![CDATA[cia]]></category>
            <category><![CDATA[data-science]]></category>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Fri, 26 Jan 2024 09:43:49 GMT</pubDate>
            <atom:updated>2024-01-26T09:43:49.659Z</atom:updated>
            <content:encoded><![CDATA[<h3>Introduction</h3><p>A cloud computing environment can be realized as a graph of nodes connected over networks where some nodes act as clients and the rest as servers or intermediaries to the servers. It is a computing model where users can access a vast pool of computing resources over a network. The resources can be configured and used based on individual requirements, with minimal management or provider interaction. This allows for greater flexibility in computing and eliminates the need for users to invest in expensive infrastructure and maintenance. Cloud computing is defined by several key features: broad network access, on-demand self-service, resource pooling, rapid elasticity and scalability, and measured or metered service and while it has several advantages, it also poses challenges to privacy and data security. As the cloud computing environment can be realized as a network of nodes, each node has the potential to generate, store, and/or process data which means the security of data cannot be localized to a set of nodes but rather should be expanded to the means or channels of inter-communication, processing and storing data within a single node.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/596/1*FOQ2C_KFE9pSpM2ZMZIZcQ.jpeg" /></figure><p>Let’s take two imaginary characters Barry and Alice to understand data-in-use, data-in-transit, and data-at-rest. Let’s say Barry wants to share a picture of a delicious cheeseburger with Alice. Barry took the photo on his smartphone and it has been stored there since then. This means that the cheeseburger photo is currently at rest. Barry opens the picture and attaches it to an email. This action loads the photo into memory, and it becomes data in use, specifically by his phone’s photo viewer and email applications. Once Barry hits ”Send,” the email with the attached photo travels over the Internet to Alice’s email service, and it becomes data in transit.</p><p>In this post, we will go through key challenges in achieving the said goals and ways to mitigate them.</p><h3>The CIA triad</h3><p>The CIA triad, which stands for confidentiality, integrity, and availability, is a foundational concept in data security. It provides a framework for understanding and addressing the key security challenges involved in protecting data. The CIA triad was originally developed in the context of information security, but it is also applicable to the security of data in the cloud. Confidentiality refers to the protection of sensitive information from unauthorized access. This means that only authorized users should be able to access and use the data. In the cloud, confidentiality can be achieved through a variety of means, such as:</p><ol><li>Access control</li><li>Data encryption</li></ol><p>Integrity refers to the assurance that data is accurate and complete. This means that the data has not been tampered with or altered in any way. In the cloud, integrity can be achieved through a variety of means, such as:</p><ol><li>Hashing</li><li>Digital signatures</li></ol><p>Availability refers to the assurance that data is accessible to authorized users when they need it. This means that the data is not unavailable due to outages, downtime, or other<br>disruptions. In the cloud, availability can be achieved through a variety of means, such as:</p><ol><li>Redundancy: Redundant data storage ensures that data is available even if one storage system fails. This can be done through replication, which copies data to multiple locations</li><li>Disaster recovery: Disaster recovery plans allow organizations to restore data and applications in the event of a disaster. This can include backup and recovery procedures, as well as the ability to failover to a secondary site.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/550/1*hbF-kCM80HPVgqmtvkL_eg.png" /></figure><h3>Cloud computing layers and data security</h3><p>Cloud computing layers define how cloud computing resources and services are delivered to users. The three layers are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each layer manages different aspects of the computing stack and offers a unique level of abstraction.</p><ol><li><strong>IaaS</strong>: IaaS provides virtualized computing resources over the Internet. It offers fundamental computing infrastructure, such as virtual machines, storage, and networking. Access to such critical resources can pose potential threats to data security due to shared resources, network security challenges, user access controls, hypervisor security, data residency and compliance, and many others.</li><li><strong>PaaS</strong>: PaaS is a platform that allows users to create, run, and manage applications without having to deal with the complexities of infrastructure management. This model entails offering Infrastructure as a Service as well as operating systems and server applications like web servers. Although PaaS offers benefits such as increased productivity and more efficient development processes, it also has certain features and considerations that may pose potential threats to data security. These include limited control over the infrastructure, a shared environment, reliance on the security of the service provider, data transmission security, as well as authentication and authorization issues.</li><li><strong>SaaS</strong>: SaaS software applications are delivered over the internet, removing the need for users to install, maintain, and update software locally. However, the SaaS model raises certain data security concerns for data transmission over the Internet, data storage on third-party servers, identity and access management (IAM), shared resources in multi-tenant environments, etc.</li></ol><h3>Security challenges to Data-in-transit</h3><ol><li><strong>Man-in-the-Middle Attacks</strong></li></ol><ul><li><strong>Challenge:</strong> Attackers can intercept and manipulate data during transmission without the knowledge of the sender or recipient.</li><li><strong>Mitigation:</strong> Implement secure communication protocols such as HTTPS, which encrypts data during transmission, and uses digital signatures to verify the authenticity of the transmitted data.</li></ul><p><strong>2. Packet Sniffing</strong></p><ul><li><strong>Challenge:</strong> Unauthorized individuals may use packet sniffing tools to capture and analyze data packets flowing over the network.</li><li><strong>Mitigation:</strong> Encrypt data using protocols like SSL/TLS to prevent the interception of sensitive information. Use virtual private networks (VPNs) to create secure communication channels.</li></ul><p><strong>3. Data Interception</strong></p><ul><li><strong>Challenge:</strong> Data transmitted over unsecured channels can be intercepted by malicious actors.</li><li><strong>Mitigation:</strong> encryption mechanisms (e.g., SSL/TLS) to protect the confidentiality of data. Avoid transmitting sensitive information over unsecured networks.</li></ul><p><strong>4. Distributed Denial of Service (DDoS) Attacks</strong></p><ul><li><strong>Challenge:</strong> DDoS attacks can disrupt internet traffic, affecting the availability and performance of data transmission.</li><li><strong>Mitigation:</strong> Implement DDoS mitigation strategies, use content delivery networks (CDNs), and deploy firewalls to filter and manage incoming traffic.</li></ul><p><strong>5. DNS Spoofing</strong></p><ul><li><strong>Challenge:</strong> Attackers can manipulate the Domain Name System (DNS) to redirect users to malicious websites.</li><li><strong>Mitigation:</strong> Use DNS security measures, such as DNS Security Extensions (DNSSEC), to ensure the integrity and authenticity of DNS information.</li></ul><p><strong>6. Insufficient Authentication</strong></p><ul><li><strong>Challenge:</strong> Weak or absent authentication mechanisms can lead to unauthorized access to transmitted data.</li><li><strong>Mitigation:</strong> Implement strong authentication protocols and mechanisms, such as multi-factor authentication, to ensure that only authorized users can access and transmit data.</li></ul><h3>Security Challenges to Data at Rest</h3><ol><li><strong>Data Encryption</strong></li></ol><ul><li><strong>Challenge:</strong> Ensuring that data is adequately encrypted when at rest can be challenging. Organizations need to implement strong encryption mechanisms to protect against unauthorized access.</li><li><strong>Mitigation:</strong> Use robust encryption algorithms and key management practices. Cloud providers often offer encryption services, such as server-side encryption for storage resources.</li></ul><p><strong>2. Key Management</strong></p><ul><li><strong>Challenge:</strong> Effectively managing encryption keys is critical. If keys are compromised, it could lead to unauthorized access to the encrypted data.</li><li><strong>Mitigation:</strong> Implement secure key management practices, such as using hardware security modules (HSMs), rotating keys regularly, and restricting access to key management systems</li></ul><p><strong>3. Access Controls</strong></p><ul><li><strong>Challenge:</strong> Unauthorized access to data can occur if access controls are not properly configured. Misconfigured permissions may result in data exposure.</li><li><strong>Mitigation:</strong> Implement granular access controls, regularly review and audit permissions, and follow the principle of least privilege. Utilize Identity and Access Management (IAM) features provided by the cloud provider</li></ul><p><strong>4. Cloud Provider Security</strong></p><ul><li><strong>Challenge:</strong> Relying on a third-party cloud provider introduces concerns about the security practices and measures implemented by the provider.</li><li><strong>Mitigation:</strong> Choose reputable cloud providers with robust security certifications. Regularly assess the provider’s security controls and audit reports.</li></ul><p><strong>5. Insider Threats</strong></p><ul><li><strong>Challenge:</strong> Insider threats, whether intentional or accidental, can pose risks to data security at rest.</li><li><strong>Mitigation:</strong> Implement monitoring and auditing mechanisms to detect unusual or suspicious activities. Educate users on security best practices and enforce strong authentication.</li></ul><h3>Security challenges of data in use</h3><ol><li><strong>Data Encryption</strong></li></ol><ul><li><strong>Challenge:</strong> Ensuring the encryption of data while it is actively being processed poses challenges, especially in scenarios where data needs to be decrypted for computation. While ”memory encryption” or ”runtime encryption” involves protecting data while it is actively being processed in a computer’s memory adding an extra layer of security, it comes with its own set of challenges such as computation cost in terms of latency and throughput, application compatibility, performance overheads, ability to debug a program, etc.</li><li><strong>Mitigation:</strong> Implement homomorphic encryption or secure enclaves to perform computations on encrypted data without exposing the raw information.</li></ul><p><strong>2. Secure Processing Environments</strong></p><ul><li><strong>Challenge:</strong> Protecting data during processing requires secure execution environments to prevent unauthorized access or tampering.</li><li><strong>Mitigation:</strong> To create secure processing environments, it is recommended to use technologies like Trusted Execution Environments (TEEs) or hardware-based security solutions. However, remote cryptographic attestation is also an essential part of confidential computing. The attestation process evaluates the trustworthiness of a system and ensures that confidential data is only released to a TEE after it provides verifiable evidence of being genuine and operating with an acceptable security posture. If a system lacks attestation, it can trick others into trusting it, pretend to run specific software in a TEE, and potentially compromise the security and accuracy of the data being processed or the trusted code.</li></ul><p><strong>3. Access Controls</strong></p><ul><li><strong>Challenge:</strong> Implementing granular access controls for data in use is complex, especially in multi-tenant cloud environments.</li><li><strong>Mitigation:</strong> Leverage Identity and Access Management (IAM) solutions to enforce least privilege access and regularly audit and update access policies.</li></ul><p><strong>4. Memory-based Attacks</strong></p><ul><li><strong>Challenge:</strong> Data processed in memory is susceptible to memory-based attacks, such as buffer overflows or injection attacks.</li><li><strong>Mitigation:</strong> Employ secure coding practices, conduct regular code reviews, and use tools to detect and mitigate memory-based vulnerabilities.</li></ul><p><strong>5. Secure APIs and Interfaces</strong></p><ul><li><strong>Challenge:</strong> Insecure application interfaces can expose data in use to unauthorized access or manipulation.</li><li><strong>Mitigation:</strong> Regularly assess and secure APIs, enforce proper authentication and authorization mechanisms, and monitor API activities.</li></ul><p><strong>6. Compliance and Auditing</strong></p><ul><li><strong>Challenge:</strong> Meeting compliance requirements for data in use involves continuous monitoring and auditing, which can be resource-intensive.</li><li><strong>Mitigation:</strong> Implement automated compliance checks, conduct regular audits, and use tools to ensure ongoing adherence to regulatory standards.</li></ul><h3>Conclusion</h3><p>Cloud computing has become increasingly popular in recent years, and as a result, the need for robust security measures to protect data at rest, in transit, and in use has also grown. Cloud computing has become increasingly popular in recent years, and as a result, the need for robust security measures to protect data at rest, in transit, and in use has also grown.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d734e9ed4b2f" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Visual Mastery: Elevating github with Impactful displays]]></title>
            <link>https://medium.com/@guptashubhang2000/visual-mastery-elevating-github-with-impactful-displays-8abbea39d022?source=rss-fabd9c5ffa99------2</link>
            <guid isPermaLink="false">https://medium.com/p/8abbea39d022</guid>
            <dc:creator><![CDATA[Shubhang Gupta]]></dc:creator>
            <pubDate>Mon, 11 Sep 2023 06:47:28 GMT</pubDate>
            <atom:updated>2025-07-20T13:43:33.716Z</atom:updated>
            <content:encoded><![CDATA[<p>I am a budding web developer, and just like <a href="https://github.com/shubhanggupta2000"><em>me</em></a>, many other developers use GitHub as their go-to platform to manage and store their codes. Some more professional coders might be using <a href="https://bitbucket.org/product"><em>Bitbucket</em></a><em>, </em><a href="https://about.gitlab.com/"><em>Gitlab</em></a><em>, </em><a href="https://azure.microsoft.com/en-in/products/devops"><em>Azure DevOps</em></a>, etc. But perhaps they will also agree with me that the UI/UX of GitHub is more the reason to get attracted towards it every time.</p><blockquote><strong>The greatest value of a picture is when it forces us to notice what we never expected to see.</strong></blockquote><p>Since GitHub is used by many people who wish their profile looks more engaging &amp; attractive so that the visitors get impressed every time. I myself want the same for my GitHub Profile so I began searching and exploring <a href="https://zzetao.github.io/awesome-github-profile/"><em>different Github profiles</em></a> that look professionally amazing, and found a smorgasbord of graphs, videos, and all kinds of visualization tools.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/278/1*w4_h7wcRoywSACgMbbrAfw.jpeg" /></figure><p>So, In an unorganised manner here are the things that I found use-worthy</p><ol><li><strong>Github Isometric Contributions</strong></li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*fBGkfaNRmGoyFp3J5_hBXA.jpeg" /></figure><p>This is a <strong>Chrome extension</strong> that visualizes your GitHub contributions graph and creates an isometric 3D pixel view of the public data on your profile. Just add the extension to your Chrome browser, reload the browser, and open your GitHub profile, you will be able to see the 2D/3D option on the top-right of your contribution chart and it works like a charm.<br><a href="https://chrome.google.com/webstore/detail/github-isometric-contribu/mjoedlfflcchnleknnceiplgaeoegien">— get the extension</a></p><p><strong>2. GitHub Wrapped</strong><br><a href="https://github.com/neat-run/wrapped">Source</a> · <a href="https://wrapped.run/">Create your own</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/880/1*zUq5d7GaWlNJ91-h8kH6Vw.gif" /><figcaption>GitHub Wrapped</figcaption></figure><p>Created by NEAT — A desktop inbox of GitHub notifications for your desktop Menubar on macOS &amp; Apple silicon-based Macs. A little app that shows the total number of commits, contributions, stars — given and received, etc. The images and graphics generated look great on the GitHub readme.</p><p><strong>3. GitHub Unwrapped</strong><br><a href="https://www.githubunwrapped.com/brunosimon">Demo</a> · <a href="https://github.com/remotion-dev/github-unwrapped-2022">Source</a> · <a href="https://www.githubunwrapped.com/">Create your own</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/240/1*WkRFE15nSR7Yln7pHjjJcg.gif" /><figcaption>GitHub Unwrapped</figcaption></figure><p>Looks like some Christmas celebration in here. Github unwrapped is an amazing, fun way to display your profile activity. It shows what time and date of the week you were most productive and also displays the issues you opened and closed on a Christmas tree.</p><p>You can learn more about it on Twitter, just use the <strong><em>#githubunwrapped</em></strong> on Twitter.</p><p><strong>4. GitHub Trends Wrapped</strong><br><a href="https://www.githubtrends.io/wrapped/yyx990803">Demo</a> · <a href="https://www.githubtrends.io/wrapped">Create your own</a><br>Lines of code changed, Bar charts, Scatter Charts, Weekend Activity, daily, weekly, monthly contribution charts…….<br>phew! do I need to mention more features or will you care for some self-assistance? This tool has all these things and many more.</p><p>Probably this is what your <em>pointy-haired boss</em> will be looking for when reviewing your performance if you’re cursed fortunate enough to face meet them.<br><strong><em>Echo</em></strong>: hopefully not!</p><p><strong>Ok! Time for some 3D tools:</strong></p><p><strong>5. GitHub Skyline<br></strong><a href="https://skyline.github.com/mishmanners">Demo</a> · <a href="https://skyline.github.com/">Create your own</a><br>Looks like some sci-fi movie’s generic computer screen. Skyline provides an amazing 3D wave-ish model that looks like the new york skyline (maybe, hence the name!). It is viewable in your browser, but unfortunately, you cannot use it in your GitHub profile for obvious reasons.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ehEhy3fXYmAaepu_yWLNRw.png" /><figcaption>GitHub Skyline</figcaption></figure><p>Don’t worry! If you feel like bragging about your amazing contributions to people, just download the .stl file and print it on a 3D printer. A perfect decoration, a prop for your desk setup, or Mantelpiece.</p><h3>Lars Gyrup Brink Nielsen @LayZee@mastodon.nu on Twitter: &quot;My year in code #GitHubSkyline pic.twitter.com/EOMX7pLbzz / Twitter&quot;</h3><p>My year in code #GitHubSkyline pic.twitter.com/EOMX7pLbzz</p><p><strong>6. GitHub Cities<br></strong><a href="https://honzaap.github.io/GithubCity/?name=brunosimon&amp;year=2022">Demo</a> · <a href="https://honzaap.github.io/GithubCity/">Create your own</a></p><blockquote>You shouldn’t build a city with sticks and stones, neither should you build it on someone’s contribution graph.</blockquote><p>The GitHubCity project aims to visualize the geographical distribution of GitHub users and their activity on a world map. It is developed &amp; managed by “honzaap” using three.js.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NPpsSphSD3F0HytogLXZFQ.jpeg" /></figure><p><strong><em>Pro tip:</em></strong> Please add some NPCs to make it more fun while using like a controllable car or maybe some birds.</p><p><strong>7. GitHub Town<br></strong><a href="https://www.mornhee.works/apps/github-town/brunosimon/2023">Demo</a> · <a href="https://github-town.mornhee.works/">Create your own</a></p><p>@<a href="https://github.com/mornhee">mornhee</a> got inspired by the above two projects so much that he created a kind of combination of both and made this awesome-looking 3D scene where months are represented by blocks &amp; contributions are represented by skyscrapers.</p><p>fun fact: @mornhee also uses Github Isometric Contributions in his GH profile.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/880/1*OK30PDDrQqQgR2eu2KcZ2w.png" /></figure><p><strong>8. Open Source Wrapped</strong><br><a href="https://github.com/Schrodinger-Hat/open-source-wrapped">Source</a> · <a href="https://wrapped.schrodinger-hat.it/">Create your own</a><br>A spotify wrapped cameo to open source development made by @<a href="https://github.com/Schrodinger-Hat">schrodinger_hat</a>. Just download the Images and maybe set them as your mobile phone background if you feel like doing it like me.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Ctpdu7_2AxMqZVJTtWsJnA.png" /></figure><p><strong>9. GitHub Wrap App</strong><br><a href="https://www.githubwrap.app/wrap/brunosimon">Demo</a> · <a href="https://www.githubwrap.app/">Create your own</a><br>App made with Next.js &amp; Tailwind using Mono sans font, It generates a portrait like summarization of your GitHub activity. Maybe now that empty photo frame of yours will not be so empty, or use it as your phone’s background if you are a fan of dark themes like me.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*7-ARqDGo2Kui92nHrGNxEA.png" /><figcaption>Bruno Simon’s github</figcaption></figure><p><strong>10. GitHub Contributions Chart Generator</strong><br><a href="https://github.com/sallar/github-contributions-chart">Source</a> · <a href="https://github-contributions.vercel.app/">Create your own</a><br>Here’s a splendid opportunity for you to provide your esteemed GitHub username, allowing this magnificent generator to bestow upon you a year-by-year breakdown of your contributions from the inception of your account until this very moment.</p><p>yeah! I know, It’s an exquisite chance to take a leisurely stroll down memory lane and regale yourself with nostalgic tales.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/480/1*F27_KmZnO1eykElRatIgOg.png" /><figcaption>Bruno Simon’s year-wise charts</figcaption></figure><p><strong>Protip:</strong> Should you possess a penchant for engaging in visualized data manipulation, do consider availing yourself of the JSON-formatted data located on the web page’s inconspicuous link situated discreetly in the lower left corner. It’s akin to an enigmatic treasure awaiting its grand unveiling!</p><p>Now, how about a touch of personalization?</p><p><strong>11. Building your own Github Activity Visualizer</strong><br>There is a little something called GitHub GraphQL API, where a simple query run like the one below can be used to obtain the graph of contributions for a given period.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/824/1*XNJ80_CZBLUse3Gkr0zBuQ.png" /><figcaption>GraphQL query</figcaption></figure><p><strong>12. Chartscii weekly chart</strong><br>ChartSCII is a command line tool that allows you to generate ASCII charts according to your need and designs. Just install it using the Instructions from the repository <strong><em>https://github.com/mkaz/termgraph</em></strong>.<br>Probably you may find the instructions on how to use it: Still I will tell you how I did it. <br>Install ChartSCII: npm install -g chartscii<br>Retrieve weekly data from GitHub Rest API using a personal access token:</p><pre>curl -H &quot;Authorization: Bearer &lt;YOUR_ACCESS_TOKEN&gt;&quot; \<br>     &quot;https://api.github.com/repos/&lt;USERNAME&gt;/&lt;REPO&gt;/stats/participation&quot;</pre><p>Format the data into an array of objects, each containing a label and value.<br>run `chartscii &lt;chartData&gt;`</p><p>example of API response:</p><pre>const response = {<br>  &quot;all&quot;: [2, 5, 8, 4, 6, 2, 1],<br>  &quot;owner&quot;: [1, 2, 1, 3, 2, 1, 0]<br>};<br><br>const weeklyActivity = response.all;<br><br>const chartData = weeklyActivity.map((value, index) =&gt; ({<br>  label: `Week ${index + 1}`,<br>  value<br>}));<br><br>chartscii &#39;[{&quot;label&quot;: &quot;Week 1&quot;, &quot;value&quot;: 2}, {&quot;label&quot;: &quot;Week 2&quot;, &quot;value&quot;: 5}, ...]&#39;</pre><p>The chart might look like this:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/656/1*gzVjh3vLz5hHw7iN6sKzHg.png" /><figcaption>ChartSCII representation</figcaption></figure><p><strong>13. Honorable Mentions</strong><br>The ones that are going to be mentioned below are also pretty amazing tools but honestly, I didn’t find them that good compared to the above ones. So, here are some honorable mentions —</p><ul><li><strong>snk:</strong> yeah! I know quite the gen-z name for a tool but you may be able to get an idea about what is it gonna be. correct :D It’s a snake but not a game that you can play. This snake will hiss…. around your contributions to keep them in a boundary.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*CQizUgakhTrjihcKJ2S3wA.gif" /></figure><p>That’s it for now! BTW this was my first ever blog, if any mistakes or any suggestions the professionals would like to give, they are most welcome. I hope you enjoyed the read, a clap would be appreciated. Cheers!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8abbea39d022" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>