The world has witnessed one of the worst pandemics which has brought the economies under surveillance but also prepared many countries for the disaster. Countries which were more focused on financial sectors have now shifted their focused-on Health Care Industry. Our Scientist, frontline warriors like Doctors, Nurses and other helping hands are doing their best to prevent the spread and keep society safe. Medical experts are busy in vaccine formation and running clinical trials to ensure that vaccines are safe for all humans without even a single trace of allergy or side effect.

Vaccine formation and clinical trials are well…


Test Driven Development is not just a software development process, it’s a basic software hygiene.

Test-Driven Development is an iterative process where the developer writes the test cases before they write the production code. It’s always said that TDD is an error-driven approach where new code is written only if the existing test cases fail. It’s a rapid cycle of testing, coding, and refactoring.

# Step 1 -> Write a test, watch it fail

The first step in TDD is marked as a RED zone area, here a developer is expected to write the unit test for the function which…


A cultural adaptation to bring a secure change !!

DevOps is a collaboration between Software Developers and IT Administrators aimed to speed up the development, integration, testing, deployment, and monitoring of the application. Traditionally development and IT operations are handled by two distinct teams in a closed boundary, however DevOps enables the cross functioning of both the teams.

DevOps is not only about the automation activity but also focuses on broader areas like Continuous Integration (CI) which comprises Coding, Integrating, and Testing accompanied by Continuous {Delivery / Deployment} (CD) for project delivery.

DevSecOps

DevSecOps is a culture of adding security…


Cryptography is an art of securing information and communication, where only the sender and the intended recipient can view the content of the information. The term Cryptography is derived from the Greek word kryptos and graphy ,where kryptos means “Hidden” and graphy means “Art of writing”. The term Crypto has become verypopular after the introduction of crypto currencies like Bitcoin, Ethereum, etc. Cryptography is basically used to secure the electronic transaction where the sender encrypts the message and sends it over the network and the receiver decrypts the message to get the original content.

Components of Cryptography

Plaintext: A text message, image or…


Ansible is an opensource tool for software provisioning, configuration management, and application-deployment enabling infrastructure as code. There are many automation tools available which use the master-slave configuration, however Ansible uses the SSH connection for operations. Ansible playbooks are written on YAML which are easy to understand, and its OS agnostic behavior makes it interoperable. It has a capacity to handle hundreds of nodes with a single command.

Ansible playbook is a bunch of commands or tasks to be run on the host machine, it can be as simple as getting the hostname or installing any software. Inventory file keeps track…


The core of any Blockchain application is the network on which it runs. Orchestrating this network in a secured environment which can be easily managed is the key for any successful deployment. There are many practices emerged to orchestrate and manage the network. Today we will focus on how Kubernetes can be used to orchestrate Corda Open Source Network.

First step in the Kubernetes orchestration is to create a cluster of nodes. Use the below article to create a Kubernetes cluster with a single Master and 3 Worker Nodes.

Dockerzise the Node

Kubernetes is a container orchestration tool which helps…


Kubernetes 101

Kubernetes is an open source container orchestration engine by Google. Kubernetes engine helps to automate deployment, scaling, and management of containerized applications. The containerization era had brought in a need to manage the containers which run the application and scale or handle failover when required.

Let’s take an example of the failover scenario to understand the requirement, in a traditional system we will need human intervention when there is a failover. The application will need to setup a separate process to monitor the health of the application and when unreachable will send a notification to the dev team to take…


Network is the backbone of any application which provides the infrastructure and a path for interaction with different modules. There can be many reasons which can lead to network up-gradation like incorporating new features of security, scalability or dependency resolution due to addition of new component. Since blockchain is a distributed and decentralized network, having consensus from all the participants and understanding the impact of other interrelated component is the major planning activity.

Hyperledger fabric components are dockerized for deployment which makes it easily upgradable. Upgrading fabric images from version 1.3.0 to 1.4.0 doesn’t require any channel capabilities to be…


Application extensibility is a software principle for further growth of the application. Growth can be in terms of adding new functionality or to enhance the existing. In blockchain, extensibility is not limited to adding new rules to the smart contract but also need to accommodate network growth. Network growth can be a little tricky and need to have a good governance model associated with it. Initially the network might consist of few organizations, however, there should be provision where one organization can leave or join the business network.

Hyperledger Fabric allows us to add multiple peers to any given organization…


Hyperledger Fabric uses channels to keep the data private for other participants in the network. However, creating many channels for each type of transaction makes it more complicated for managing. Fabric starting from v 1.2 added the ability to create a private data collections which allows organizations within the channel to endorse, invoke and query private data collections without creating additional channels.

Private data collections are sent via gossip protocol to the authorized organization peers without the involvement of ordering service. These collections are stored in private state database of an authorized organization peers, which can be accessed via chaincode…

Dinesh Rivankar

Architect, Blockchain Innovation Group. #TOGAF #ConfidentialComputing #Corda #Hyperledger #SmartContract

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store