<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Astha Upadhyay on Medium]]></title>
        <description><![CDATA[Stories by Astha Upadhyay on Medium]]></description>
        <link>https://medium.com/@aucodes?source=rss-86951051b530------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*J-JF4N7OdOKMwhWlaMK5Kw@2x.jpeg</url>
            <title>Stories by Astha Upadhyay on Medium</title>
            <link>https://medium.com/@aucodes?source=rss-86951051b530------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 01:15:37 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@aucodes/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Buckle Up: My Entrepreneurial Ride]]></title>
            <link>https://aucodes.medium.com/buckle-up-my-entrepreneurial-ride-936b82fc9bc6?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/936b82fc9bc6</guid>
            <category><![CDATA[copenhagen]]></category>
            <category><![CDATA[entrepreneurial-mindset]]></category>
            <category><![CDATA[entrepreneurship]]></category>
            <category><![CDATA[startup]]></category>
            <category><![CDATA[entrepreneurial-journey]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Mon, 06 Mar 2023 23:31:40 GMT</pubDate>
            <atom:updated>2023-03-06T23:40:06.298Z</atom:updated>
            <content:encoded><![CDATA[<p>I was thrilled to receive a notification informing me that I had been accepted into the highly competitive <a href="https://www.linkedin.com/company/future-entrepreneurs-of-denmark/posts/?feedView=all">Future Entrepreneurs of Denmark </a>program for Spring 2023 in Copenhagen.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*GRvRp87cNU1cr0iDxybMFw.png" /></figure><p>After eagerly anticipating the start of the program for ten days, I finally attended the first workshop on March 3rd and was thrilled to meet a diverse group of like-minded students from various universities in Copenhagen.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/958/1*EzvSZurnaeK-nsEDN_Uh9A.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1022/1*xqow0Op8Zt31sZaaMS-oRA.png" /></figure><p>Throughout the program, we learned about the modern perspective of investors on startups and how to evaluate businesses based on factors such as team, market, business model, product, and traction. We also gained a deep understanding of complex terms like CHURN, CAC, LTV, MRR, ARR, and debt, and learned how to read financial roadmaps for each startup. One particularly intriguing topic was the valley of death, which we explored in depth.</p><p>We then delved into the entrepreneurship rollercoaster by analyzing the real experiences of <a href="https://www.linkedin.com/company/norlase-aps/">Norlase</a>. I realized that entrepreneurship is indeed a challenging journey that requires perseverance and resilience. However, it is also a rewarding experience that can bring about positive change in the world.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/563/1*MBzJFerVp16Gk2pYHl-kZw.jpeg" /></figure><p>The final session of the program was presented by the co-founders of <a href="https://www.linkedin.com/company/lifeboardrescue/">Lifeboard</a>, who shared their incredible journey of saving lives and preventing drowning accidents. They started with no entrepreneurship experience, but through hard work and dedication, they were able to turn their prototype into a successful business.</p><p>Throughout the program, I learned that entrepreneurship is a continuous learning process.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/564/1*HKDjj6LNL7d8s1n3A7keKw.jpeg" /><figcaption>Source : Pinterest @almacolic101: Accurate description of our days as entrepreneur.</figcaption></figure><p><strong>No matter how much you know, there is always more to learn.</strong></p><blockquote>One question that particularly stuck with me was, “What gets you up in the morning?” It made me think deeply about my motivation for pursuing entrepreneurship and reminded me that a strong sense of purpose is essential to succeed in this field.</blockquote><p>The program concluded with a networking session, which highlighted the importance of building a strong social network to succeed as an entrepreneur.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ZOrgBSDI39pcxJcD" /><figcaption>Photo by <a href="https://unsplash.com/@antenna?utm_source=medium&amp;utm_medium=referral">Antenna</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h4><em>I left feeling inspired and motivated to continue my journey as a future entrepreneur.</em></h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/564/1*EBxyj-8L8iUxzeOdSQq4lA.jpeg" /></figure><p>In conclusion, this program provided me with valuable knowledge and skills and I look forward to continuing to learn and grow as an entrepreneur.</p><p><em>Stay tuned for the Ideation Workshop !</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=936b82fc9bc6" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[You’re on your own, Kid]]></title>
            <link>https://aucodes.medium.com/youre-on-your-own-kid-e057c5d88cbe?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/e057c5d88cbe</guid>
            <category><![CDATA[masters-degree]]></category>
            <category><![CDATA[scholarship]]></category>
            <category><![CDATA[christmas-holiday-season]]></category>
            <category><![CDATA[women-in-tech]]></category>
            <category><![CDATA[graduate-school]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Thu, 29 Dec 2022 17:14:22 GMT</pubDate>
            <atom:updated>2022-12-29T17:14:22.119Z</atom:updated>
            <content:encoded><![CDATA[<p>Last year at this moment, I was busy writing SOPs and applying for universities for my Master’s. It was challenging to narrow down the universities from which I wanted to choose my degree (Computer Science or Technology Management).</p><blockquote>I was confident that I would be relocating to the United States to follow my aspirations after receiving acceptance letters from Carnegie Mellon University, Northeastern University, and Purdue University.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*IBGokNoT9v5DRrXe" /><figcaption>Photo by <a href="https://unsplash.com/es/@elisa_cb?utm_source=medium&amp;utm_medium=referral">Elisa Calvet B.</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h3><strong>However, life is unpredictable.</strong></h3><p>I received two fully funded scholarships from European Union to pursue my Master’s across Europe.</p><blockquote>There were many zoom calls and debates on where to go, and I made the right choice (Maybe)!</blockquote><p>As I packed my bags and said goodbye to my friends and family, I couldn’t help but feel excited and nervous. I had no idea what to expect, but I was determined to make the most of this opportunity.</p><p><strong>15th September 2022:</strong> Landed in a small town in Austria’s heart (Salzburg).</p><blockquote>Welcome to the musical hub, whose rich history and love for music are celebrated throughout.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/750/1*7pVmdEt5-xJmpctudLF9Fg.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*-I3vozgINYbiqStA" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Oee1oCEgycmLSgxG" /><figcaption>Welcome to Salzburg, Austria</figcaption></figure><blockquote>The first few days were difficult because it was pouring and cold (I went from a temperature of +40 to -4). I somehow gained autonomy walking to Ikea in the pouring rain with my classmates to get the essentials and grocery shopping. After two weeks, classes began, giving me adequate time to adjust.<br>I could critically evaluate the technology I love and its impact on society because of my coursework. My favorite “Digital Communication Theories” class addressed everything from the digital divide to filter bubbles. The class was anxious to learn and explore the myths of the digital world with guest lectures from the UK, Vienna, and Egypt.</blockquote><p><strong>3rd November 2022:</strong> RedBull IT Experience Day. I have been invited to attend the workshops and lectures in the Redbull Campus in Salzburg; I was the only non-german speaking person. However, the staff was very kind and ensured I had a great experience.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/1*1T3VQJQEQdAcpcXdPTFBcg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/558/1*eyKM0LFiK1ChK-2cWP0Abg.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*xGEvrFgpDFeEE9-7NBdwxw.jpeg" /><figcaption>Redbull Campus</figcaption></figure><p><strong>5th November 2022 :</strong> GastroHackathon at the <a href="https://www.linkedin.com/company/alles-f%C3%BCr-den-gast/">Alles für den Gast</a> in Salzburg. It was a great experience to brainstorm, design, and code for 24 hours. I learned IOS development for the first time and implemented a successful app. Damn, proud of myself.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SEEpdbc2eM5bWK9i0u11Hw.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*q04VGnRwTdgLYFb0rnnfoQ.jpeg" /><figcaption>#GastroHacker</figcaption></figure><p>Well, the first semester is almost finished. Grad school has been a wild rollercoaster, with many deadlines and proposals to write.</p><p>It has been one of my favorite Christmases ever. With international dinners, the autumn school in Wolfgangsee, visiting salt mines in Hallstatt, watching my first ice hockey match in the stadium, seeing snow for the first time, ice skating, visiting Christmas markets, and sipping mulled wine.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XFnOugBN1HeBMaV6yiXZ9g.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*OSeZHgJyyQIign2i" /><figcaption>Mulled Wine : traditional drink during winter, especially around Christmas. It is usually served at Christmas markets in Europe, primarily in Germany</figcaption></figure><p>Wishing you a Happy New Year! May 2023 be as adventurous and thrilling!</p><p><strong><em>Stay tuned for more!</em></strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e057c5d88cbe" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Voila! Risk Alert]]></title>
            <link>https://aucodes.medium.com/voila-risk-alert-47bd0fea8d30?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/47bd0fea8d30</guid>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[machine-learning-ai]]></category>
            <category><![CDATA[xai]]></category>
            <category><![CDATA[explainable-ai]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Thu, 20 Jan 2022 15:16:01 GMT</pubDate>
            <atom:updated>2022-01-20T15:16:01.365Z</atom:updated>
            <content:encoded><![CDATA[<p>With the recent adaption of AI, many real-world problems are solved.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*MQdoTsicyZlCy2EQ" /><figcaption>Photo by <a href="https://unsplash.com/@possessedphotography?utm_source=medium&amp;utm_medium=referral">Possessed Photography</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>The <a href="https://en.wikipedia.org/wiki/Black_box">black box</a> concept in ML is not new; sometimes, even we don’t know why the AI arrived at a specific decision.</p><p>So as the model gets advanced, it gets harder to explain how it works.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*E4253jaO4qEaj8Ut.gif" /></figure><p>I recently came across this <a href="https://www.cnbc.com/2021/12/29/amazons-alexa-told-a-child-to-do-a-potentially-lethal-challenge.html">article</a> that piqued my interest in asking, <em>“if algorithms today are making the best decisions?”</em></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*FiR2aFJMj5KZlj-X.png" /></figure><blockquote><strong>In a typical AI system, there are a few steps : </strong><br>First, training data is identified. Then, it undergoes the machine learning process. Then, a learned function or algorithm is produced. Through this algorithm, the system can make decisions or recommendations to a user for a specific situation.</blockquote><p>But we may never know <em>why did the AI do that? Why not something else? When did the AI succeed? When does it fail? When can I trust the AI? How can I correct an error? Well, it’s something to think about. No? </em>Coming across this <a href="https://slate.com/technology/2021/04/scatterlab-lee-luda-chatbot-kakaotalk-ai-privacy.html">article </a>illustrates how adaptive learning can be easily poisoned. So what’s the solution?</p><p>Before looking into the solution, let’s take a look into various incidents by AI:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yeGuzxtgoYofhUiTv4dOTw.png" /><figcaption>Basic Taxonomy of AI incidents</figcaption></figure><p><em>Let’s take a look into different types of attacks and security risks of ML system:</em></p><ol><li><strong><em>Adversarial Training Data</em></strong> : It is also known as a <em>Data Poisoning Attack </em>where the attacker interferes with a model’s training data. ML models are feedback loops where new data is collected and then used to retrain the model. E.g., Microsoft experienced a very high-profile attack of this type in 2016 when it launched Tay, a Twitter chatbot aimed at teens.</li><li><strong><em>Evasion Attacks : </em></strong>Also known as <em>Perturbation Attack</em> attempts to fool a model or cause it to misclassify an input. The attackers modify the input data to gain the desired response.</li><li><strong><em>Membership Interference Attacks</em></strong> :This is the attack on the model’s API once it’s deployed and doesn’t require access to the training set/model weights. An attacker attempts to discover whether a particular person’s data was included in a model’s training set or simply whether any given training example was included in a training set.</li><li><strong><em>Model Inversion Attacks :</em></strong>If the model has been trained on sensitive personal data that could cause harm if leaked, this poses a security risk and potentially breaches privacy.</li><li><strong><em>Model Theft </em></strong>: Attacker seeks to recover the entire model through queries to its API.</li><li><strong><em>Transfer learning Attacks</em></strong>: These freely available models are a potential security risk.</li></ol><p><em>Now, let’s look into an overview to mitigate security risks:</em></p><ol><li>General Security Practices.</li><li>Data Checks and Balances through validation, lineage tracking to record each source of data. <a href="https://techcrunch.com/2020/04/16/clearview-source-code-lapse/">Refer this.</a></li><li>Model Monitoring</li><li>Audits and Governance</li><li>Differential privacy</li><li>Encrypted ML</li></ol><blockquote>Well, no machine learning system can be guaranteed to be completely secure. <strong>So now what?</strong></blockquote><p>While reading more about the same, I came across the term <strong>XAI.</strong></p><blockquote><strong>A formal definition</strong>: According to <a href="https://en.wikipedia.org/wiki/Explainable_artificial_intelligence">Wikipedia</a>, Explainable AI refers to methods and techniques in the application of artificial intelligence technology such that the results of the solution can be understood by humans.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*vKIfGtB3xMkCtOnGJiV2Dw.png" /></figure><p>As can be seen in this diagram, an XAI system could replace the traditional learned function with an explainable model. This model would be built in a way where human beings could understand the decision-making process.</p><p>But, explanations can be hacked. Check this <a href="https://hbr.org/2019/12/the-ai-transparency-paradox">article</a>.</p><p>So, what now?</p><p><strong>Resources:</strong></p><ul><li><a href="https://hbr.org/2019/12/the-ai-transparency-paradox">The AI Transparency Paradox</a></li><li><a href="https://www.oreilly.com/library/view/is-building-secure/9781098107338/">Is Building Secure ML Possible?</a></li><li><a href="https://www.ericsson.com/en/reports-and-papers/white-papers/explainable-ai--how-humans-can-trust-ai">Explainable AI: How humans can trust Artificial Intelligence</a></li><li><a href="https://www.oreilly.com/radar/what-to-do-when-ai-fails/">What to Do When AI Fails</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=47bd0fea8d30" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Curiosity killed AI]]></title>
            <link>https://aucodes.medium.com/curiosity-killed-ai-fbd572022e10?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/fbd572022e10</guid>
            <category><![CDATA[ai-bias]]></category>
            <category><![CDATA[artificalintelligence]]></category>
            <category><![CDATA[machine-learning]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Mon, 03 Jan 2022 08:50:42 GMT</pubDate>
            <atom:updated>2022-01-03T08:50:42.101Z</atom:updated>
            <content:encoded><![CDATA[<p>While exploring O’Reilly, I came across the book <a href="https://www.oreilly.com/library/view/ai-and-the/9781492091837/"><em>“AI and the Law”</em> by Karen Kilroy</a>. Specific points made by the author piqued my interest.</p><blockquote>My iPhone uses Apple’s face tracking, and it is one of the AI conveniences making me wonder if my picture turns up somewhere on the Internet?</blockquote><p>For any AI system, there are some essential dependencies. Let’s take a look.</p><p><strong>Dependency 1: Data</strong><br>Data is the lifeblood of AI. Without it, AI algorithms are useless.<br>Ever wondered what kind of data is used to train the systems that power today’s world ?</p><p>Well, let’s take a dive into them.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*IEuF4uYZMln8U9SB" /><figcaption>Photo by <a href="https://unsplash.com/@markusspiske?utm_source=medium&amp;utm_medium=referral">Markus Spiske</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p><strong>Dirty data </strong>refers to<strong> </strong>inaccurate, incomplete or inconsistent, especially in a computer system or database. Well, the year 2020 brought the recent evidence we see that in the case of AI systems that police us, dirty data and faulty algorithms can ruin lives, and our reliance on AI puts our liberty in great jeopardy.</p><p><strong>Tech-washed racial bias</strong> followed by <strong>Faulty search data.</strong></p><blockquote>Your system is only as good as the data you use to train it.</blockquote><p><strong>Dependency 2: Algorithms</strong></p><p>We’re all familiar with the term “algorithm.” Do we not? The author mentions Persuasive AI while discussing various algorithms that power advanced AI systems. I looked it up because I wasn’t sure what it meant.</p><blockquote>It means that there is a science that studies what makes us want to do certain things, and when applied to predictive computer algorithms, it becomes persuasive AI. Persuasive technology is used in social media to predict and persuade us to take the most profitable action. All it needs to model us are the right algorithms and data. And, thanks to social media, we’ve willingly provided massive amounts of personal data that can be used to create our digital likeness.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*3E2rb1b_al4cFOVR" /><figcaption>Photo by <a href="https://unsplash.com/@alexbemore?utm_source=medium&amp;utm_medium=referral">Alexander Shatov</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p><a href="https://en.wikipedia.org/wiki/Garbage_in,_garbage_out"><strong>Garbage in, garbage out</strong></a> is the first fundamental of computing and is a concept that every coder is familiar with. This book highlights that in AI, a discipline that is perceived to be highly complex, this fundamental rule is often forgotten. <em>“While their algorithms and data are sure to produce imperfect results, when have we seen a human being ever make a perfect decision?” asks the author.</em></p><p>The author highlights an interesting case study: <a href="https://www.minamitamaki.com/huang/">Sz Hua Huang v. Tesla Inc</a>, resulting from Tesla’s self-driving feature, Autopilot. So the question arises <strong><em>If a human knows AI can be dangerous and uses it anyway, who is liable for the risk? </em></strong>Therefore, its correct to say that<strong><em> </em></strong>outcome is a product of intent. The intent of the software industry needs to be examined in order to produce a better outcome.</p><blockquote>AI is critical, but it is also crucial to develop frameworks for responsible innovation.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*D149iFytx52bcsUE" /><figcaption>Photo by <a href="https://unsplash.com/@askkell?utm_source=medium&amp;utm_medium=referral">Andy Kelly</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h4><strong>So how can we innovate responsibly?</strong></h4><ul><li>Use AI only as needed.</li><li>Require governance for AI</li><li>Design Better User Interfaces</li><li>Usability for Vulnerable Populations First</li><li>Regulate AI bias</li></ul><blockquote>Bias that is allowed to remain in AI models will grow with the system. One widely publicized case of biased AI was Microsoft’s chatbot, <a href="https://oreil.ly/JI3HY">Tay</a>. Within 24 hours of Tay’s debut on Twitter, Tay learned to make racist, sexist, and lewd remarks from other users’ tweets. In response, Microsoft had to shut Tay down.</blockquote><p>The fact is that just about anyone can build AI. We’d find it immensely alarming if anyone could easily gather the equipment, materials, and knowledge to build a nuclear bomb.</p><p>However, we don’t seem to be giving it much mind at all with AI. Why ?</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fbd572022e10" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Hold on, darling]]></title>
            <link>https://aucodes.medium.com/hold-on-darling-8602f13d5bc9?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/8602f13d5bc9</guid>
            <category><![CDATA[lost-and-found]]></category>
            <category><![CDATA[reflections]]></category>
            <category><![CDATA[mental-health]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Sun, 17 Oct 2021 17:05:25 GMT</pubDate>
            <atom:updated>2021-10-17T17:05:25.389Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*KBheT2igREoUCnvg" /><figcaption>Photo by <a href="https://unsplash.com/@a_d_s_w?utm_source=medium&amp;utm_medium=referral">Adrian Swancar</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>As I sit today to write something,</p><p>I’m out of ideas.</p><p>Nothing.</p><p><strong>Blank.</strong></p><p>I’m asphyxiating in the social media feed; seeing my friends start a new adventure at new companies, cities, and even countries makes me question</p><p><strong><em>where I am in life?</em></strong></p><p><em>How can I measure my progress?</em></p><p>I feel I haven’t made any improvement because I focus on the results, the end goal, but I guess</p><p>I’m wrong here,</p><p><em>every day counts,<br>even the days I lie in bed, <br>even the days when I eat icecream,<br>even the days when I wake up early,<br>even the days when I watch the sunrise,<br>even the days when I hit the gym,<br>and today was one of those days.</em></p><p>The lyrics, “<em>How can I swim when I’m drowning</em>.” summarize the past few months of my life.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*eDgRSgz9BCAF88PG" /><figcaption>Photo by <a href="https://unsplash.com/@chrisjoelcampbell?utm_source=medium&amp;utm_medium=referral">Christopher Campbell</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>Sometimes one has to hit rock bottom to bounce back again.</p><p>So, hold on.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8602f13d5bc9" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Kubernetes Architecture]]></title>
            <link>https://aucodes.medium.com/kubernetes-architecture-17faebb01b5d?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/17faebb01b5d</guid>
            <category><![CDATA[kubernetes-architecture]]></category>
            <category><![CDATA[kubernetes]]></category>
            <category><![CDATA[container-orchestration]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Mon, 26 Jul 2021 12:55:31 GMT</pubDate>
            <atom:updated>2021-07-26T12:55:31.692Z</atom:updated>
            <content:encoded><![CDATA[<p>A container orchestrator framework can create, manage, configure thousands of containers on a set of distributed servers while preserving the connectivity and reachability of these containers. Multiple tools emerged within the landscape in the past years to provide these capabilities, including Docker Swarm, Apache Mesos, CoreOS Fleet, and many more.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*bN39Q1KPiIJ_-wLx" /><figcaption>Photo by <a href="https://unsplash.com/@codestorm?utm_source=medium&amp;utm_medium=referral">Safar Safarov</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>However, <strong>Kubernetes</strong> took the lead in defining how to run containerized workloads on a distributed amount of machines.</p><p>Kubernetes is widely adopted in the industry today, with most organizations using it in production. Kubernetes currently is a graduated CNCF project, which highlights its maturity and reported success from end-user companies.</p><p>What is Kubernetes?</p><h4>Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem.</h4><blockquote>Kubernetes provides :</blockquote><blockquote>Portability: It is a highly portable tool. This is due to its open-source nature and vendor agnosticism.</blockquote><blockquote>Scalability: Kubernetes has in-build resources, such as HPA (Horizontal Pod Autoscaler), to determine the required amount of replicas for a service. Elasticity is a core feature that is highly automated within Kubernetes.</blockquote><blockquote>Resilience: Kubernetes uses functionalities like ReplicaSet, readiness, and liveness probes to handle most of the container failures, enabling powerful self-healing capability.</blockquote><blockquote>Service discovery: Kubernetes provide cluster-level DNS (or Domain Name System), which simplifies the accessibility of workloads within the cluster.</blockquote><blockquote>Extensibility: Kubernetes is a highly extensible mechanism that uses the building-block principle.</blockquote><blockquote>The operational cost of the container: Operational cost refers to the efficiency of resource consumption within a Kubernetes cluster, such as CPU and memory. Kubernetes has a powerful scheduling mechanism that places an application on the node with sufficient resources to ensure the successful execution of the service. As a result, most of the available infrastructure resources are allocated on-demand.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XTTenqvpEu0qi0uK4UjRGg.png" /></figure><p>Kubernetes is not a traditional, all-inclusive PaaS (Platform as a Service) system. Since Kubernetes operates at the container level rather than at the hardware level, it provides some generally applicable features common to PaaS offerings, such as deployment, scaling, load balancing, and lets users integrate their logging, monitoring, and alerting solutions.</p><p>Kubernetes architecture, composed of control and data planes.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ihJa5nRa71VCambX.png" /></figure><p>A Kubernetes cluster is composed of a collection of distributed physical or virtual servers. These are called <strong>nodes</strong>.</p><p>Nodes are categorized into 2 main types: master and worker nodes.</p><p>The components installed on a node, determine the functionality of a node, and identifies it as a master or worker node.</p><p>The suite of master nodes, represents the <strong>control plane</strong>, while the collection of worker nodes constructs the <strong>data plane</strong>.</p><h3>Control Plane</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/852/0*LRDbvZeADuj5VXys.png" /></figure><p>The control plane consists of components that make global decisions about the cluster. These components are the:</p><ul><li><strong>kube-apiserver : </strong>the nucleus of the cluster that exposes the Kubernetes API, and handles and triggers any operations within the cluster</li><li><strong>kube-scheduler : </strong>the mechanism that places the new workloads on a node with sufficient satisfactory resource requirements</li><li><strong>kube-controller-manager : </strong>the component that handles controller processes. It ensures that the desired configuration is propagated to resources</li><li><strong>etcd : </strong>the key-value store, used for backs-up and keeping manifests for the entire cluster</li></ul><p>There are two additional components on the control plane, they are <strong>kubelet</strong> and <strong>k-proxy</strong>. These two are special and important as they are installed on <strong>all</strong> node.</p><h3>Data Plane</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/994/0*O9EO5GwFcJ9YUFdS.png" /></figure><p>The data plane consists of the compute used to host workloads. The components installed on a worker node are the:</p><ul><li><strong>kubelet : </strong>the agent that runs on <strong>every</strong> node and notifies the <em>kube- apiserver</em> that this node is part of the cluster</li><li><strong>kube-proxy : </strong>a network proxy that ensures the reachability and accessibility of workloads places on this specific node</li></ul><p>Check out <a href="https://kubernetes.io/docs/concepts/overview/components/"><em>https://kubernetes.io/docs/concepts/overview/components/</em></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=17faebb01b5d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Journey from source to image .]]></title>
            <link>https://aucodes.medium.com/journey-from-source-to-image-f547097571ec?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/f547097571ec</guid>
            <category><![CDATA[containerization]]></category>
            <category><![CDATA[docker-compose]]></category>
            <category><![CDATA[container-orchestration]]></category>
            <category><![CDATA[docker]]></category>
            <category><![CDATA[containers]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Sun, 20 Jun 2021 17:31:04 GMT</pubDate>
            <atom:updated>2021-06-20T17:31:04.400Z</atom:updated>
            <content:encoded><![CDATA[<h3>Welcome Docker!</h3><p>After we write a code for an application, we host it into the server. Hosting involves running your web app on a particular server.<br>Hosting make the application available from a remote cloud infrastructure that is accessible through the Internet.</p><p>Now, How do we host applications?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*BOmuOSgCof8HtMu4" /><figcaption>Photo by <a href="https://unsplash.com/@austindistel?utm_source=medium&amp;utm_medium=referral">Austin Distel</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>In the past years, VMs (Virtual Machines) were the primary mechanism to host an application. VMs encapsulate the code, configuration files, and dependencies necessary to execute the application.<br> A virtual machine, commonly shortened to just VM, is no different from any other physical computer like laptops, smartphones, or servers. However, it has a CPU, memory, disks to store your files and can connect to the Internet.</p><p>Virtualization is not possible without the hypervisor. A hypervisor, or virtual machine monitor, is the software or firmware layer that enables multiple operating systems to run side-by-side, all with access to the same physical server resources. The hypervisor orchestrates and separates the available resources (computing power, memory, storage, etc.), aligning a portion to each virtual machine as needed.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/548/1*uH6oksTGpASMfIc_mbqnwA.png" /><figcaption>VM Architecture</figcaption></figure><p>However, using VM posed specific challenges as VMs require significant RAM and CPU resources.</p><p>As a result, the containers<strong> </strong>were introduced to make scaling up fast and easy.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/934/1*PX4ZswmmYecchVfw84ISRA.png" /></figure><blockquote>Where shipping containers hold products comprising many different parts, a software container encapsulates an application — often a single executable service or microservice — along with its libraries, frameworks, and other components.</blockquote><p>Multiple VMs on a hypervisor is replaced by numerous containers running on a single host operating system.</p><p>The processes in the containers are completely isolated but can access the OS filesystem, resources, and packages.</p><p>The creation and execution of containers are delegated to a container management tool, such as Docker.</p><p>Therefore, the containers are lightweight so that you can deploy multiple containers on a single server (or a VM) — no more dedicating an entire server to a single application. And you only have one OS to maintain. As a result, scaling up becomes fast and easy without the need for more server space.</p><p><strong>What is a Container?</strong></p><ul><li>A Self-contained, sealed unit of software.</li><li>It contains everything required to run the code.</li><li>It includes batteries and OS</li><li>It has Code, Config, Processes, Networking, Dependencies, OS.</li></ul><p>Consequently, there is a better usage of available infrastructure and a more efficient pathway to release a product to consumers.</p><blockquote>The appearance of containers enabled organizations to ship products using a lightweight mechanism that would make the most available infrastructure. There are plenty of tools used to containerize services. However, Docker has set the industry standards for many years.</blockquote><p>To containerize an application using Docker, three main components are distinguished:</p><ul><li><strong>Docker files:</strong> A Docker file is a set of instructions used to create a Docker image.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/253/1*b8EbDXiwBNUqNPq2BewGjg.png" /><figcaption>Docker File Example.</figcaption></figure><ul><li><strong>Docker images:</strong> A read-only template that enables the creation of a runnable instance of an application.</li></ul><p><strong><em># build the image</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/802/1*CHx_r5VZMhDt5iiZZg44oQ.png" /></figure><p>docker build -t go-helloworld .</p><p><strong><em># tag the image</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/788/1*4DB5D8cesBq-KbzDykEuaQ.png" /></figure><p>docker tag go-helloworld aucodes/go-helloworld:v1.0.0</p><p><strong><em># push the image</em></strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/856/1*i7RGLHefekAzEETJtVWnqQ.png" /></figure><p>docker push aucodes/go-helloworld:v1.0.0</p><ul><li><strong>Docker registries:</strong> The image needs to be pushed to a public Docker image registry to make it accessible to everyone.</li></ul><p>Now, I assume you understood the basics, now onto the next phase.</p><p>The next stage in the release process is the deployment of the service. However, running an application in production signifies that thousands and millions of customers simultaneously consume the product. For this reason, it is paramount to build for scale. It is impracticable to manually manage thousands of containers, keeping these up-to-date with the latest code changes, in a healthy state, and accessible.</p><p>As a result, a <strong>container orchestrator framework</strong> is inevitable.</p><blockquote><a href="https://aucodes.medium.com/architecture-considerations-for-cloud-native-b7e67fb093ca">Checkout out the previous blog.</a></blockquote><blockquote>Stay Tune for more!</blockquote><blockquote>Resources :</blockquote><blockquote><a href="https://docs.docker.com/develop/develop-images/dockerfile_best-practices/">https://docs.docker.com/develop/develop-images/dockerfile_best-practices/</a></blockquote><blockquote><a href="https://docs.docker.com/engine/reference/builder/#from">https://docs.docker.com/engine/reference/builder/#from</a></blockquote><blockquote><a href="https://docs.docker.com/engine/reference/commandline/tag/">https://docs.docker.com/engine/reference/commandline/tag/</a></blockquote><blockquote><a href="https://buildpacks.io/docs/app-journey/">https://buildpacks.io/docs/app-journey/</a></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f547097571ec" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Architecture Considerations for Cloud Native!]]></title>
            <link>https://aucodes.medium.com/architecture-considerations-for-cloud-native-b7e67fb093ca?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/b7e67fb093ca</guid>
            <category><![CDATA[cloud-native]]></category>
            <category><![CDATA[design-patterns]]></category>
            <category><![CDATA[microservice-architecture]]></category>
            <category><![CDATA[monolithic-architecture]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Sun, 13 Jun 2021 04:52:39 GMT</pubDate>
            <atom:updated>2021-06-20T17:34:13.320Z</atom:updated>
            <content:encoded><![CDATA[<h3>Architecture Considerations : Part 2</h3><p>Before coding an application, it’s necessary to understand the design considerations.</p><p>It depends on :</p><ul><li><strong>Business Requirements</strong> -&gt; understanding who the stakeholders are, the functionalities, the input/output process, and finally, the end-users.</li><li><strong>Available resources</strong> -&gt; which include engineering resources, financial resources, time frames, and internal knowledge.</li></ul><p><em>So, before diving, let us take a look at the Application Architectural designs.</em></p><p><strong>Monolithic architecture:</strong></p><p>In the monolith, all the components are coupled to each other and distributed as a single unit. As a result, all the business logic functions have the same repository, share resources, and have the same programming language. As a result, the development is simple; deployment is straightforward, and communication between components happens in the same process.</p><h4>But what happens when you have to scale the application?</h4><p>Yes, you are correct; it becomes much more complicated to maintain it since the change in one component would imply modifying another. Likewise, the deployment becomes more complicated since a change means redeploying the entire system again. It’s no longer a simple task since, generally the only way to scale this type of application is to replicate the whole application over and over again.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/221/1*QBUgPOC6od4nF98E1UHv5g.png" /><figcaption>Resource : <a href="https://sterling.com/microservices-vs-monolithic/">https://sterling.com/microservices-vs-monolithic/</a></figcaption></figure><p><strong>Microservice Architecture:</strong></p><p>This type of architecture proposes to have lightweight decoupled services with a single responsibility isolated from each other with independent storage and autonomous deployability.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/588/1*0fPqouoCHHDEjvV_rEAh5Q.png" /></figure><p>According to Sam Newman, “Microservices are the small services that work together.”</p><p>The Application tiers include:</p><ul><li>User Interface -&gt; Handles HTTP request.</li><li>Business Logic -&gt; refers to the functionalities for the specific service.</li><li>Data Layer -&gt; for communicating with the Database.</li></ul><p>For better understanding, take a project, e.g., design an Airplane Booking System and compare the architectures.</p><p>There is no “golden path” to design a product, but a good understanding of the trade-offs will provide a clear project roadmap.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*J2Ua53YIrwp2iPWI" /><figcaption>Photo by <a href="https://unsplash.com/@austindistel?utm_source=medium&amp;utm_medium=referral">Austin Distel</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>Let’s look into the trade-offs:</p><ul><li>Development complexity</li><li>Scalability — focuses that there are enough replicas of an application to satisfy all user requests.</li><li>Time to deploy — refers to ship new features efficiently using the pipeline.</li><li>Flexibility</li><li>Operational cost</li><li>Reliability- ability to respond quickly to failures by having insightful logs and metrics.</li></ul><p>So, what can be the best practices for Application deployment?</p><ul><li>Health Checks</li><li>Metrics</li><li>Logs</li><li>Tracing</li><li>Resource consumption</li></ul><p>Always remember the choice of an application structure is highly impacted by available resources, requirements, and involved trade-offs.</p><p>Beginner ? Read the<a href="https://aucodes.medium.com/intro-to-cloud-native-6879d155120a"> Introduction to Cloud Native.</a></p><p><a href="https://aucodes.medium.com/journey-from-source-to-image-f547097571ec">wanna know more?</a></p><blockquote>Resources :</blockquote><blockquote><a href="https://microservices.io/">https://microservices.io/</a></blockquote><blockquote><a href="https://www.geeksforgeeks.org/monolithic-vs-microservices-architecture/">https://www.geeksforgeeks.org/monolithic-vs-microservices-architecture/</a></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b7e67fb093ca" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Intro to Cloud Native!]]></title>
            <link>https://aucodes.medium.com/intro-to-cloud-native-6879d155120a?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/6879d155120a</guid>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[container-orchestration]]></category>
            <category><![CDATA[cloud-native]]></category>
            <category><![CDATA[coding]]></category>
            <category><![CDATA[kubernetes]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Sat, 12 Jun 2021 19:53:23 GMT</pubDate>
            <atom:updated>2021-06-13T15:02:22.983Z</atom:updated>
            <content:encoded><![CDATA[<h3>Cloud Native 101</h3><p>Becoming a software developer is not always about designing and coding applications; it’s also significant for any software developer to understand how the deployment process runs and how the infra operates.</p><p><strong>Hence, understanding the fundamentals is of utmost importance.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/967/1*Q35u9zLuKjUNFzkCKWs2IA.png" /><figcaption>How the industry has evolved ! Resource: <a href="https://www.linkedin.com/learning/devops-foundations-going-cloud-native">https://www.linkedin.com/learning/devops-foundations-going-cloud-native</a></figcaption></figure><p>As Cloud-native is among the most pervasive terms heard across IT today, let’s understand its basics.</p><h4>What precisely is cloud-native?</h4><p>Cloud-native is an approach that enables developers and organizations to be more agile, providing workload portability and scalability.</p><blockquote><em>CNCF ( </em>Cloud Native Computing Foundation<em> ) defines it as Cloud-native technologies that empower organizations to build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds. Containers, service meshes, micro services, immutable infrastructure, and declarative APIs exemplify this approach.</em></blockquote><p><strong>Four Pillars of Cloud-Native:</strong></p><ul><li>Use micro service approach to build applications.</li><li>Package micro service as containers.</li><li>Use the Dev Ops approach to deploy infrastructure.</li><li>Continuously deliver your applications to end customers.</li></ul><p>Cloud-native relies on existing technologies and assumes that organizations have already undergone a paradigm shift to Dev Ops and continuous integration or delivery. The aim is to get the development team and operation teams to work better together.</p><p>Thus, operations get the ability to handle infrastructure in a much more agile manner. With features to manage resources automatically,quickly scaling the infrastructure and platform features to recover from application failures allows operations to be more resilient. This allows ops to spend more time building better infrastructure,managing machine utilization, and improving operational overhead in general.</p><p><strong>Containers</strong> are closely associated with cloud-native terminology. Containers are used to run a single application with all required dependencies. The main characteristics of containers are easy to manage, deploy, and fast to recover. Kubernetes is a container orchestrator that is capable of solutionizing the integration of the following functionalities:</p><ul><li>Runtime</li><li>Networking</li><li>Storage</li><li>Service Mesh</li><li>Logs and metrics</li><li>Tracing</li></ul><p>The main reasons why an organization needs to adopt cloud-native technologies are <strong>enabling quick delivery of value to customers and quickly extending to new features and technologies.</strong></p><p>There are two perspectives to keep in mind.</p><p><strong>Business :</strong></p><ul><li>Agility</li><li>Growth</li><li>Service availability</li></ul><p><strong>Technical perspective:</strong></p><ul><li>Automation</li><li>Orchestration</li><li>Observability</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*t3g5D-ybec92INjX" /><figcaption>Photo by <a href="https://unsplash.com/@homajob?utm_source=medium&amp;utm_medium=referral">Scott Graham</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p><a href="https://aucodes.medium.com/architecture-considerations-for-cloud-native-b7e67fb093ca">Read Part 2.</a></p><blockquote>Stay tuned for more!</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6879d155120a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Stuck in the weeds]]></title>
            <link>https://aucodes.medium.com/stuck-in-the-weeds-1d9991ab9096?source=rss-86951051b530------2</link>
            <guid isPermaLink="false">https://medium.com/p/1d9991ab9096</guid>
            <category><![CDATA[mental-health-awareness]]></category>
            <category><![CDATA[mental-health]]></category>
            <category><![CDATA[peace-of-mind]]></category>
            <category><![CDATA[inspiration]]></category>
            <category><![CDATA[comparison]]></category>
            <dc:creator><![CDATA[Astha Upadhyay]]></dc:creator>
            <pubDate>Fri, 28 May 2021 08:45:39 GMT</pubDate>
            <atom:updated>2021-05-28T08:45:39.579Z</atom:updated>
            <content:encoded><![CDATA[<p>And suddenly I was drowning,<br>As I was moving down towards the bottom, I noticed how blue the water was, it was exhilarating as blue was my favorite color, I could feel the air in my lungs diminishing, as I touched the bottom, I wanted to stay there for a while as it was serene, away from the bothersome thoughts of the future, and the troubling past. It was mid-summer, and the water was cold against my skin; for mere seconds, I could feel the stillness. I pushed against the water and came up gasping for air.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*fMOjdshUTxsP1w8B" /><figcaption>Photo by <a href="https://unsplash.com/@enginakyurt?utm_source=medium&amp;utm_medium=referral">engin akyurt</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><p>How can we fight through the thoughts of the unpredictable future?</p><p>How can I tell my mind not to overthink every situation and question every choice?</p><p>With the onset of technology, every click, every dm, every snap somehow pushes me to compare myself with others, and the never-ending thoughts echo, <strong>“ I’m not good enough”.</strong></p><blockquote>Is it something we all go through?</blockquote><p>Maybe.</p><p>I lie awake, bestowing my mind with insecurities, and the vulnerabilities and the uncertainty of the future terrify me.</p><p><strong>“What if I never get what I want to achieve”</strong></p><p>With continuous mindless scrolling through LinkedIn, Instagram; the anxious sensation returns with great strength, empowering me to overthink and cry.</p><p>A perpetual cycle.</p><p>What is the way out?</p><p>or</p><p>Is there a way out?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*E5iMp6R5T4xFWm0e" /><figcaption>Photo by <a href="https://unsplash.com/@averieclaire?utm_source=medium&amp;utm_medium=referral">averie woodard</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><blockquote><em>World, I want to leave you better<br>I want my life to matter<br>I am afraid I have no purpose here<br>I watch the news on TV<br>Abandon myself daily<br>I am afraid to let you see the real me</em></blockquote><blockquote><em>Rain it falls, rain it falls<br>Pouring on me<br>And the rain it falls, rain it falls<br>Sowing the seeds of love and hope, love and hope<br>We don’t have to stay here, stuck in the weeds</em></blockquote><blockquote><em>Have I the courage to change?<br>Have I the courage to change?<br>Have I the courage to change today?</em></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1d9991ab9096" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>