Friday, November 6, 2020

Network engineering continued

This is a continuation of the earlier posts starting with this one: http://ravinote.blogspot.com/2020/09/best-practice-from-networking.html

Messages may contain just the hash of the data and the challenge while the responses may contain just the proof. This enables the message exchange to be meaningful while keeping the size within a limit.

Contracts are signed and stored by both parties. Contracts are just as valuable as the sensitive data. Without a contract in place, there is no exchange possible.

Parties interested in forming a contract use a publisher-subscriber model that is topic-based and uses a bloom filter implementation which tests whether an element is a member of a set.

Emerging trends like Blockchain have no precedence for storage standards. A blockchain is a continuously growing list of records called blocks which are linked and secured using cryptography. Since it is resistant to tampering, it becomes an open distributed ledger to record transactions between two parties.

Blockchain is used for a variety of purposes. Civic for instance enables its users to login with their fingerprints. It uses a variety of smart contracts, an indigenous utility token and new software applications. A Merkel tree is used for attestation.

#codingexercise:

Given an array of non-negative integers, you are initially positioned at the first index of the array. 

Each element in the array represents your maximum jump length at that position. 

Determine if you can reach the last index. 

 

public static boolean isReachable(int[] A) { 

      Int n = A.length; 

      int dp[] = new int[n]; 

     dp[0] = 1; 

     dp[1] = 1; 

     for (int m = 2; m < n; m++) { 

             dp[m] = 0; 

             for (int  j = 1; j <= A[m] && j <= ij++) { 

                    dp[m] += dp[m-j] ; 

             }  

    }  

    return dp[n-1] !0; 

} 

 


No comments:

Post a Comment