Posted in Interesting, Programming, Web Tech

IIFE : Immediately Invoked Function Expression

What is IIFE?

As the name says, IIFE, Immediately Invoked Function Expression is a function which is immediately invoked as soon as it is defined in javascript programming. It is a very popular way of handling javascript programs where the interpret runs it only once.

Different syntax:

  1. ( function( ){ //statements })( );
  2. ( function( ){ //statements }( ));
  3. ( ( )=>{ //statements })( );

It has two parts: One is the function enclosed within () group operator, helps in accessing variables within function and second part which directly creates the immediately invoked function expression () which the javascript engine interprets. This whole concept of design pattern is called as Self Executing Anonymous Function.

As the function name is not used, they are called as anonymous function.

When is IIFE important?

As IIFE is executed once it is defined and interpreted once by javascript engine.

It maintains encapsulation and avoids polluting of variables which are not required for global access.

The code which does not have reusability can also be a part of IIFE. Hence this function is also an anonymous function.

Posted in Interesting, Poetics

Yeah, I’m unstoppable today

All smiles, I know what it takes to fool this town
I'll do it 'til the sun goes down and all through the night time
Oh yeah
Oh yeah, I'll tell you what you wanna hear
Leave my sunglasses on while I shed a tear
It's never the right time
Yeah, yeah I put my armor on, show you how strong how I am
I put my armor on, I'll show you that I am 
I'm unstoppable
I'm a Porsche with no brakes
I'm invincible
Yeah, I win every single game
I'm so powerful
I don't need batteries to play
I'm so confident
Yeah, I'm unstoppable today
Unstoppable today
Unstoppable today
Unstoppable today
I'm unstoppable today
Break down, only alone I will cry on out
You'll never see what's hiding out
Hiding out deep down
Yeah, yeah
I know, I've heard that to let your feelings go
Is the only way to make friendships grow
But I'm too afraid now
Yeah, yeah I put my armor on, show you how strong how I am
I put my armor on, I'll show you that I am
I'm unstoppable
I'm a Porsche with no breaks
I'm invincible
Yeah, I win every single game
I'm so powerful
I don't need batteries to play
I'm so confident
Yeah, I'm unstoppable today
Unstoppable today
Unstoppable today
Unstoppable today
I'm unstoppable today
Unstoppable today
Unstoppable today
Unstoppable today
I'm unstoppable today
I put my arm around, show you how strong I am
I put my arm around, I'll show you that I am
I'm unstoppable
I'm a Porsche with no breaks
I'm invincible
Yeah, I win every single game
I'm so powerful
I don't need batteries to play
I'm so confident
Yeah, I'm unstoppable today
Unstoppable today
Unstoppable today
Unstoppable today
I'm unstoppable today
Unstoppable today
Unstoppable today
Unstoppable today
I'm unstoppable today

Song credits: Sia Furler / Chris Braide

Posted in Interesting, Memoirs, Poetics

What has changed

I keep asking myself
What has changed?
What am I missing on? 
Well...Was it not the same?

Maybe, 
A quiet touch of musings
Pondering over the vast ocean of thoughts
Glad that it happened, that I took the first step

What could be more worse than this?
Where is the charm?

Cheer up, dear
Don't be so hard on self
Reflect on with others

Know
Just that
Time has changed
So, shall we
All

*** Composed by Vinit Desai ***

Posted in Interesting, Programming, Web Tech

Blockchain

What is Blockchain?

Blockchain is a decentralized and distributed system with details of digital records of transactions. The digital based ledger records are often referred to as blocks. The blocks of individual records are linked together like a chain. Hence it is collectively referred to as a blockchain.

The blockchain was invented by Satoshi Nakamoto for public transaction of bitcoin cryptocurrency.

What does a Blockchain contain?

Blockchain contains information about data i.e. relevant information about transaction, hash which is a unique code for the block, previous blocks hash. The first block which does not have previous block’s hash is called Genesis block. This series of information inside a block helps in tracking the history and difficult to modify the blockchain records hence adds security.

How transactions are done in blockchain?

For a blockchain the decision of adding the transaction to the chain is done by consensus and not by a single administrator as incase of centralized system. The majority of computers connected in the network have to validate the transaction. Also data that is available on blockchain network cannot be deleted from all systems as everybody in the network holds copy of blockchain records.

Uses of blockchain?

In cryptocurrency like bitcoin blockchain technology is very useful. Bitcoin eliminates the need of middle layer of banks and helps in asset to asset transfer as it is without the conversion of currency values based on location.

In real estate, the use of blockchain eliminates the need of notary. The records of real estates buying and selling gets recorded in the blockchain.

In hospital management system blockchain is used to record patients relevant data for doctors to access.

Posted in Interesting, Poetics

Please hold on, It’s a kind request😷

And the bubble has burst
Again
Fool! You fool! thought
The battle of coronavirus, COVID-19 was over, with those  
Vaccines in your hat?
But, let me remind
It's not over yet
Second wave or Tsunami
Whatever you may call it

Held in a big mess
The world 
You and me 
And
Everybody else
Broke rules, some of our own
Few of theirs
So unwillingly but needily
Introduced to 
Unusual isolated bitter shifts
Of routine
To be available
Only online
All the time

Not an easy escape
Working in frontline
Indeed proved to be Lifeline
Serving over time
Loads and loads
Men and women

Many congratulations
You have witnessed  
And survived
Epidemic turned pandemic
Through prolonging
Tough times

A little impatience,
Casualness
Among the masses
Rises the spread
Beyond control
Lockdown, curfew 
Temporary buyback 
For time

However bored,
Burned out
The desires unrest
Along boundless zest
With your each breathe
Sanitize
Mask Up
Socially maintain distance

Hold on,
For yourself
For the sake of
 Near and dear ones
Please hold on
It's a kind request
Let's give it a tough fight


*** Composed by Vinit Desai ***
Posted in Memoirs, Poetics

Waiting

The song I came to sing
remains unsung to this day
I have spent my days in stringing
and in unstringing my instrument

The time has not come true,
the words have not been rightly set
only there is the agony
of wishing in my heart

I have not seen his face,
nor have I listened to his voice
only I have heard his gentle footsteps
from the road before my house

But the lamp has not been lit
and I cannot ask him into my house
I live in the hope of meeting with him
but this meeting is not yet

*** Composed by Rabindranath Tagore***
Posted in Interesting, Open Source, Programming, Softwares, Web Tech

Types of web cookies

This post in continuation to my earlier post which explains about Web cookie

There are types of web cookies namely

  • Session cookie: They are created during a session of user, stored in a temporary memory. They do not have any expiration date and are deleted immediately as soon as the browser is closed. The other popular names of session cookie are non-persistent cookie, transient cookie, in-memory cookie.
  • Persistent cookie: For this cookie, an expiration time is set. So, the cookie is deleted only at the expiration time and not deleted as soon as the browser is closed. They are used for maintaining session of the user. That is, once the user is logged into the website and if the user closes and reopens browser the cookie identifies if its a authorized user or not.
  • First party cookie: This cookie is set by the website and the cookie information can be used for analytics of page views, number of logged in users etc.
  • Third party cookie: Unlike first party cookie, this cookie is set by another website domain (not directly visited by user) whose plugins are used by the primary website.
  • Secure cookie: This is a cookie with encrypted data which can be used over an encrypted HTTPS connection. They are useful in e-commerce and banking websites where the safety and security of transactions in the topmost priority.
Posted in Interesting, Programming, Web Tech

Web cookie

You have been browsing the internet and chances are when you visit a website for the first time then for some of websites you may have come across a pop-up or a notification banner: “This website uses cookies” with buttons for accept and change settings. Sometimes you just say, Oh whatever that is! Let me just get into the website and press the Accept button to go about your way. So let us understand what is happening behind the scenes.

What is a web cookie?

Web cookie or browser cookie is a small piece of information which is send from website server to be stored in a user’s browser. The user may store it in its computer which is basically used to identify the computer. That is, maintain stateful information so the next time, user visits the website or on the next request it can send back, the cookie that can have some kind of information about the user that the server can make use of to make certain decisions. Other purposes could be for instance, track user’s browser activity or remember login details, track site’s user count etc.

Who invented it?

The term was coined by web browser programmer who invented cookie Lou Montulli in the year 1994 while building an e-commerce website.

Why do we see the cookie banner pop up?

The reason why we see the cookie banner popping up recently across most websites is because of legal concerns in Europe and some other countries, the GDPR(General Data Privacy Regulation) requires that the cookie banners be displayed on website to let the users know that cookies are being used by the website.

Where is a cookie useful?

Its used in session management to manage session of the user in ecommerce website. Its used for personalization like the settings that were set and saved by the user and as said earlier, also used for tracking to improve the user experience as they say it 😉

Posted in Interesting, Open Source, Softwares, Web Tech

Digital footprint

What is digital footprint?

So, you are an active internet user. You have atleast one social media account and in some point of time have uploaded a photo, shared a video, have liked/commented on friend’s post. Also, the likes on a post,  private chat messages, the online shopping search of your favourite brand etc. Aren’t these the activities we, as individual’s tend to do to be connected and engaged or in search of something online? In simple terms, all this content builds up what is called as digital footprint.

That means, digital footprint also referred as digital shadow is a content (text or audio or video) with a set of traceable digital activities of an individual on the digital devices or any internet platform. That is, the stuff  what you leave behind when you use online services for online shopping, social networking etc.

Why should you be concerned about digital footprint?

Once you are logged into any website be it for online shopping or listening to a trending song, remember that web is secretly tracking all your actions allowing the targeted marketers to advertise exactly what products you have been browsing in you recent past. Also social media platforms often introduce new policies of usage that we may tend to accept just by clicking Accept/Ok button without actually reading the policies. User privacy is a concern.

All this data can be leaked to make a profit out of it for research in terms of marketing products and building it better for human convenience where a set of customers habits and user experience can be traced.

Can we avoid not being eavesdropped?

As suggested by one of my friend you may say as well, if privacy is a concern browse without login into websites, use browser’s incognito mode, clear browser history. That doesn’t solve the problem at base level as there is this loophole: every device has a unique IP address and uniquely the browsed content can be easily traced.