Hashing, Salts, and PeppersHave you ever wondered how your passwords are kept secure?Apr 8, 2024Apr 8, 2024
The Vigenère Cipher and Kasiski’s MethodThe Vigenère Cipher is a famous classical encryption algorithm which was developed as a more robust solution to the pitfalls of…Mar 5, 2024Mar 5, 2024
The I2C ProtocolI2C may at first sound like the name of a newly discovered star. But, I2C is actually the name of a very simple, yet powerful…Sep 19, 2021Sep 19, 2021
Kruskal’s Minimum Spanning TreeRecently, I have been researching image segmentation. I find it fascinating that a machine can, to some degree, mimic the ability of humans…Aug 27, 2021Aug 27, 2021
Autograd andBackpropagation in PytorchHave you ever used the following three lines of code, or some variation of them, in your ML scripts and had no clue what their purpose was?Jul 8, 2021Jul 8, 2021
WiFi vs. EthernetWiFi. Ethernet. These two terms are thrown around loosely, especially when discussing streaming and gaming. But, what truly are these…Jul 4, 2021Jul 4, 2021