Building a Quantum Shield: The Hybrid Defense of TLS 1.3Beyond the Padlock: Preparing for Quantum Supremacy in Online Security.Mar 6Mar 6
Published inInfoSec Write-upsBeyond the Hype: What Quantum Cryptography REALLY Is (and Isn’t)What do we need to do now to make our systems secure?Feb 23Feb 23
Published inData Science CollectiveMastering Object Hashing in Python: A Practical GuideHave you ever struggled to hash complex Python objects to remove duplicates? When dealing with nested structures or non-serializable…Feb 11Feb 11
Published inBetter ProgrammingQuantum Computing: How To Add Two Numbers Using Quantum CircuitA step-by-step walk-through on how to add two numbers using quantum computing circuitsSep 27, 2023Sep 27, 2023
Published inInfoSec Write-upsPhishing Domain Detection using Neural NetworksApplying neural networks on domain name analysis to detect phishingJun 15, 2022Jun 15, 2022
Published inInfoSec Write-upsDetecting DNS Tunneling using Spark Structured StreamingFrom generating DNS logs to end-to-end implementation of structured streamingJun 7, 2022Jun 7, 2022
Published inTDS ArchiveWrapping PySpark DataFrames using The Decorator Pattern in PythonHow to wrap a PySpark DataFrame?Sep 20, 2021Sep 20, 2021
Published inTDS ArchiveDistributed Hugging Face Tokenizer using PySparkHow to broadcast tokenizer and use it with UDFsFeb 22, 20213Feb 22, 20213
Published inin-python-i-trustoh my lovely: list comprehensionin python i trust — verse 4Oct 15, 2020Oct 15, 2020
Published inin-python-i-trustsmall and anonymous lambdain python i trust — verse 3Oct 14, 2020Oct 14, 2020