The decentralization of the internet

Information exchange happens through multiple dimensions on the internet; between individuals (e.g. email, chat), groups of individuals (e.g. social media, news/publishing/media), organizations/businesses (e.g. online b2b operations), and between businesses and customers (e.g. online b2c operations, e-commerce). The largest internet companies by revenue and market capitalization today are companies which provide services in one of these[…]

Prototypal inheritance in Javascript

Let’s run through the code above. We have created a “base constructor” function MyAnimalConstructor(), which accepts 3 arguments, adjective, color and specie. This constructor function will set it’s own properties (adjective, color and specie) of every object instantiated with this constructor. Then, we add an activity method to the prototype of the MyAnimalConstructor(). This can[…]

Secure password management with availability in mind for mere mortal beings

So let’s presume you have several accounts for different services over the internet which require authentication to access and control, ranging from sensitive (government gateways, internet & phone banking, email accounts, etc.) to “less” sensitive accounts (social platforms, networking, etc.). Suppose you own or manage a business, now you have double of all the accounts[…]