Aditya Chatterjee's Blog

June 20, 2025

Blockchain Nodes Demystified: A Technical Overview

In the ever-evolving world of decentralized technologies, understanding the core infrastructure behind blockchain systems is essential. Among the most critical components of any blockchain network are nodes. While frequently mentioned, nodes are often misunderstood. This article provides a technical overview of blockchain nodes, demystifying their role, types, and operational significance within a distributed ledger environment.

What Are Blockchain Nodes?

At its simplest, a node is any device—ty...

 •  0 comments  •  flag
Share on Twitter
Published on June 20, 2025 11:30

May 15, 2025

Run Llama3.1-8B (LLM) on DigitalOcean CPU droplet


Llama is an open-source pre-trained LLM released by Meta which can be used to run ChatGPT like prompts locally on CPU or GPU. Llama comes in different sizes like 1B parameters, 8B, 70B and 405B. The capability of the LLM increases with the number of parameters. This is preferred to OpenAI API because using Llama locally gives more native support.

The 8B variant of LLM performs reasonably well and can ask moderate level questions and write simple code as well. This is something 1B variant cannot...

 •  0 comments  •  flag
Share on Twitter
Published on May 15, 2025 09:58

March 28, 2025

C++ Coding Cheatsheet: GOAT edition

The book "C++: Coding Cheatsheet: GOAT edition" is the only book you need to master C++ programming concepts. The focus is on practical programming skills, design concepts and performance engineering ideas.

GOAT = "Greatest Optimizations, Abstractions and Techniques"

Read C++ Coding Cheatsheet: GOAT edition here for free

This book include:

Chapters covering all core concepts in C++ programming, code design and optimization including:OOP concepts, Inheritance, Composition, Singleton pattern...
 •  1 comment  •  flag
Share on Twitter
Published on March 28, 2025 10:29

March 5, 2025

DL1943 Deep Learning Cheatsheet

The book "Deep Learning: DL1943 Cheatsheet: DL/AI/ML Research, Engineering, Optimization & System Design" is the only book you need to master Deep Learning (DL) concepts.

Get your copy of DL1943 Cheatsheet

DL1943 CHEATSHEET BOOK

This book include:

Chapters covering all core concepts in DL research, engineering and optimization including:Basic concepts like Perceptron, Gradient DescentAll basic terms like epoch, topK and basic ops like MaxPoolCore techniques like INT8 QuantizationDeep Learning System Design (wit...
 •  1 comment  •  flag
Share on Twitter
Published on March 05, 2025 06:34

January 10, 2025

Multi-Agent Cyber-Physical Systems

Introduction

In a previous article, we introduced the concept of cyber-physical systems (CPS). Moving further in our journey into CPS, agent is a term we will be encountering quite a lot. So let's get that off our plate first. Simply put, an agent is an autonomous entity that navigates through a given environment.

In the context of CPS, we can think of an agent as an entity that interacts with the environment in a manner defined by its hybrid automaton. Consider the bouncing ball example we disc...

 •  0 comments  •  flag
Share on Twitter
Published on January 10, 2025 12:21

November 27, 2024

Introduction to Concurrency in Go

Table of ContentsIntroductionGo's Concurrency ModelGoroutinesChannelsCommunication TypesBuffered vs. Unbuffered ChannelsA Nice Concurrency ProblemIntroductionIntroduction to Concurrency in Go

Rob Pike, one of the creators of the Go programming language, is often attributed with the following quote:

Concurrency is about dealing with lots of things at once. Parallelism is about doing lots of things at once.

Simplest real life example to this could arguably be multi-tasking. When we multi-task, we are basically s...

 •  0 comments  •  flag
Share on Twitter
Published on November 27, 2024 07:14

November 21, 2024

Understanding the differences and use Cases of torch.Tensor.max and torch.max in PyTorch

PyTorch is one of the most popular Deep Learning (DL) libraries today, thanks to its flexibility and ease of use. However, the extensive range of its features can sometimes lead to confusion, especially when two functions appear to have overlapping purposes. This is the case with torch.Tensor.max and torch.max, two methods that allow users to find maximum values in tensors. So, why does PyTorch provide two different ways for a similar operation? This article aims to clarify their differences, ex...

 •  0 comments  •  flag
Share on Twitter
Published on November 21, 2024 11:01

An Introduction to Cyber-Physical Systems

Introduction

Put in simple terms, a cyber-physical system (CPS), as the name suggests, is a dynamical system that exhibits both discrete (cyber) and continuous (physical) dynamic behavior. Due to their distinct mixed discrete-continuous dynamics, they are also known as hybrid systems.

We model such systems using mathematical structures aptly named hybrid automata. Let us now look into these structures to get a deeper understanding of what a CPS is.

What exactly is a hybrid automaton?

Consider as...

 •  0 comments  •  flag
Share on Twitter
Published on November 21, 2024 10:32

October 24, 2024

Understanding Linux Namespaces: The Building Blocks of Containerization

Let me give you a rough idea of containerization metaphoricaly. Imagine living in a house with no rooms, utter chaos and no privacy, where everything blends together. Horrible right! Now, picture introducing rooms: suddenly, life feels organized and beautiful!(yes privacy too!) Similarly, containerization brings order to software development, creating isolated environments for applications. This way, chaos transforms into efficiency and clarity, making it easier to manage, deploy, and scale app...

 •  0 comments  •  flag
Share on Twitter
Published on October 24, 2024 11:30

October 23, 2024

Goals of Network Security

Table of ContentsIntroductionConfidentialityDefinitionProtocols to Ensure ConfidentialityAttacks on ConfidentialityIntegrityDefinitionProtocols to Ensure IntegrityAttacks on IntegrityAuthenticationDefinitionProtocols to Ensure AuthenticationAttacks on AuthenticationAvailabilityDefinitionProtocols to Ensure AvailabilityAttacks on Availability1. Introduction

Network security is a critical aspect of modern computer networks, ensuring the protection of data, systems,...

 •  0 comments  •  flag
Share on Twitter
Published on October 23, 2024 14:08