<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The AlterEgo Journal]]></title><description><![CDATA[The AlterEgo Journal]]></description><link>https://blog.prachotanbathi.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1606548076287/noa90vGsw.png</url><title>The AlterEgo Journal</title><link>https://blog.prachotanbathi.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 15:15:25 GMT</lastBuildDate><atom:link href="https://blog.prachotanbathi.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Devin: Your New Co-Worker or Job Thief?]]></title><description><![CDATA[Let's face it, folks. Us software engineers have been living a pretty cushy life. We get to solve problems with fancy code, build cool things, and argue about the merits of tabs versus spaces (tabs win, fight me). But lately, a new kid on the coding ...]]></description><link>https://blog.prachotanbathi.com/devin-your-new-co-worker-or-job-thief</link><guid isPermaLink="true">https://blog.prachotanbathi.com/devin-your-new-co-worker-or-job-thief</guid><category><![CDATA[llm]]></category><category><![CDATA[Software Engineering]]></category><category><![CDATA[internships]]></category><category><![CDATA[jobs]]></category><dc:creator><![CDATA[Prachotan Reddy Bathi]]></dc:creator><pubDate>Mon, 18 Mar 2024 04:59:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1710734123956/484f7874-6dfb-4a6a-a4f4-80dae825f070.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Let's face it, folks. Us software engineers have been living a pretty cushy life. We get to solve problems with fancy code, build cool things, and argue about the merits of tabs versus spaces (tabs win, fight me). But lately, a new kid on the coding block has got us all feeling more nervous than a Python programmer at a Ruby conference: LLMs.</p>
<p>So, here I am, a fellow CS grad student, ready to jump out of the academic oven and take on the software engineering world; I feel that same internship itch. Visions of Silicon Valley glory dancing in my head – ping-pong tables and endless snacks. But then, the tech gods threw a curveball in the form of a LinkedIn post: Meet Devin (or is it the Devil?)</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://youtu.be/fjHtjT7GO1c">https://youtu.be/fjHtjT7GO1c</a></div>
<p> </p>
<p>At first, panic seized me. Was Devin here to steal my dream internship? I saw myself slinging coffee while this silicon superstar did groundbreaking stuff. I pictured myself relegated to coding documentation – the purgatory of the software engineering world.</p>
<p>But then, a glimmer of hope (and maybe a free piece of cake from the NCAA Selection Party, Fight On!) sparked a different thought. What if Devin wasn't the enemy but the ultimate wingman?</p>
<p>Here's the thing: while Devin can crank out code faster than you can say "stack overflow," it can't exactly, well, think outside the box (because, well, it doesn't have a box). While Devin might be the coding prodigy, you can unlock its true potential. You see, a tool like Devin is impressive with symbols – code, data, and the language of computers. But it lacks real-world experience, the bumps and bruises of life. That's where we come in. We humans bring the embodiment, the experience of the world that gives meaning to the symbols we use. (Psst... Prof. Saty talks about this in his <a target="_blank" href="https://link.springer.com/chapter/10.1007/978-3-031-50381-8_77">paper</a>.)</p>
<p>This is when it hit me like a syntax error: maybe the LLMs everyone's losing sleep over aren't the villains in this story. Imagine a world where Devin handles all the mind-numbing coding tasks – the ones that make you question your life choices more than a debugging marathon. Picture it: you get to focus on the fun stuff – the creative problem-solving, the architectural marvels, the parts that make you feel like a coding rockstar instead of a syntax checker.</p>
<p>Here's the real scoop, my digital compatriots: the rise of AI isn't the death knell for software engineers. It's a call to arms to level up our game. Sure, Devin can crank out code, but can it grasp the intricacies of insurance claims processing or navigate the complexities of an e-commerce platform? Can it charm stakeholders and explain why their "million-dollar idea" might be a ticking time bomb wrapped in a segfault bow? Nope, that's where we shine.</p>
<p>The future of software engineering isn't about out-coding the machines; it's about becoming domain experts. It's about diving deep into the business problems we're tackling and using our coding superpowers (maybe with a little assist from Devin) to fashion elegant solutions. In short, it's about evolving into coding savants, the Obi-Wans to R2-D2 (minus the beeping and booping).</p>
<p><img src="https://i.imgflip.com/4onm3j.jpg" alt="Obi Wan we need to be going up R2 Blank Template - Imgflip" class="image--center mx-auto" /></p>
<p>So, next time you hear whispers of AI stealing your thunder, don't panic. Embrace the change. Level up your domain expertise. Be the indispensable human guide who steers Devin's coding prowess toward greatness. Because ruling the software engineering kingdom with a helpful AI sidekick sounds way cooler than flying solo amidst a sea of bug reports.</p>
<p>Now, if you'll excuse me, I've got some data structures to conquer and a crash course in ARM architecture to ace (because, who knows, maybe Devin will need help writing the firmware for the next Apple Silicon). Stay tuned for updates on my journey, and do not forget to refer me to an open position at your company (you'll need someone on your side when Devin enters the chat).</p>
]]></content:encoded></item><item><title><![CDATA[The March to Democracy]]></title><description><![CDATA["Democracy must be something more than two wolves and a sheep voting on what to have for dinner." -James Bovard

People getting excited in parliaments, campaigns becoming louder, hate speeches brewing, rising fake promises, and "people" not moving ou...]]></description><link>https://blog.prachotanbathi.com/the-march-to-democracy</link><guid isPermaLink="true">https://blog.prachotanbathi.com/the-march-to-democracy</guid><dc:creator><![CDATA[Prachotan Reddy Bathi]]></dc:creator><pubDate>Sat, 28 Nov 2020 12:44:47 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1606564135590/wZP9gyMCY.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote>
<p>"Democracy must be something more than two wolves and a sheep voting on what to have for dinner." -James Bovard</p>
</blockquote>
<p>People getting excited in parliaments, campaigns becoming louder, hate speeches brewing, rising fake promises, and "people" not moving out of The White House. Do all these epitomize something? Democracy going down?</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=1NlqhEeK1iw">https://www.youtube.com/watch?v=1NlqhEeK1iw</a></div>
<p>Are people not happy with democracy? Should we turn to alternatives?</p>
<p>Rising protests, the poor economic performance of some democracies, the surge in rigged elections stand in contrast to the orderliness and better economic performance of a few non-democracies.
<img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1606564506472/glPTHV48w.jpeg" alt="Wntd7Pe.jpg" /></p>
<p>Personally, I believe that democracy is still the best system of large scale governance. When democracies and non-democracies are compared, on average democracies perform better, are wealthier, have a higher level of human development.</p>
<p>All the pessimism about democracy is partly due to politicians who seem to be detached from everyday lives leading to political alienation. This might give rise to populism and extremism which may threaten democracy.</p>
<p><img src="https://qph.fs.quoracdn.net/main-qimg-1068ed718a8d0399e8312301ebee9aea.webp" alt="main-qimg-1068ed718a8d0399e8312301ebee9aea.webp" />
The government of the one or the few is unresponsive, unaccountable, and unconstrained. We have built different institutions to maximize the values that we associate with democracy. Even the basic institution of elections and voting allow us to achieve responsiveness, responsibility, and accountability.
Thus,</p>
<blockquote>
<p>If you don't vote, you don't matter</p>
</blockquote>
]]></content:encoded></item><item><title><![CDATA[Health Data Privacy: Stolen medical records can compromise your identity]]></title><description><![CDATA[In spite of alerts given and security patches available (many not installed), the 2017 WannaCry attack scale was unprecedented. WannaCry has compromised over 300,000 machines worldwide, demanding ransoms in the form of Bitcoin. Fifty U.K. hospitals h...]]></description><link>https://blog.prachotanbathi.com/health-data-privacy-stolen-medical-records-can-compromise-your-identity</link><guid isPermaLink="true">https://blog.prachotanbathi.com/health-data-privacy-stolen-medical-records-can-compromise-your-identity</guid><category><![CDATA[health]]></category><category><![CDATA[technology]]></category><category><![CDATA[Security]]></category><category><![CDATA[privacy]]></category><dc:creator><![CDATA[Prachotan Reddy Bathi]]></dc:creator><pubDate>Sat, 28 Nov 2020 07:41:35 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1606549283687/a-M_Yp2L1.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In spite of alerts given and security patches available (many not installed), the 2017 WannaCry attack scale was unprecedented. WannaCry has compromised over 300,000 machines worldwide, demanding ransoms in the form of Bitcoin. Fifty U.K. hospitals have had system-wide lockouts, delays for patient care, and loss of function in connected devices such as MRI scanners and coolers for blood storage. This attack was not aimed specifically at healthcare institutions, but the damage was widespread.</p>
<p>We’re in the era of digital information. Nearly all facets of our lives–business finance, education, government, and entertainment are affected by digital communications &amp; information services. Clinical medicine is highly informative, but it is one of the few areas of our society where access to information by machine is very limited in areas such as billing and preparation, laboratory results reporting, and diagnostic tools (like radiology and cardiology). </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1606548847614/di66Bahwq.webp" alt="natanael-melchor-43LwvC-eQPM-unsplash.webp" /></p>
<p>However, the transfer to widely accepted electronic records (EPRs), due to numerous pressure levels, is accelerating and is inevitable. These include the desire to improve healthcare through timely access to information and the need for continuous access to medical records, healthcare workers, and administrators. These also include meeting the needs of highly mobile patients, increasing cost efficiency, and increasing the use of telemedicine/telecare.</p>
<p>Health technology is capable of expanding, protecting, and improving life. This ranges from electronic register storage (EHRs), healthcare and delivery control devices (including wearables and general-purpose devices and body-incorporated technology), and remotely-even worldwide telemedicine technology supplying care. Patients increasingly use mobile apps, which can now be integrated into the medical Internet of Things (IoT) for collaborative management of diseases.</p>
<p>Present data protection research studies the issue from a theoretical perspective by making assumptions on the background of the attacker’s knowledge. It also studies the quantification of external knowledge and sanitization of data to ensure that the level of disclosure is lower than a certain threshold.</p>
<blockquote>
<p>”Once you’ve lost your privacy, you realize you’ve lost an extremely valuable thing.” – Jodi Rell.</p>
</blockquote>
]]></content:encoded></item></channel></rss>