Published inAbnormal Security Engineering BlogSoftware Design Patterns for a Distributed CodebaseHow Abnormal utilizes design patterns to maintain a scalable codebase across all areas of engineeringNov 4, 2021Nov 4, 2021
Published inAbnormal Security Engineering BlogJoining Abnormal Security as a New Grad Software EngineerHow I found a full-time role and onboarded during the pandemicFeb 23, 20211Feb 23, 20211
Published inTDS ArchiveDeep Learning Research and How to Get ImmersedFinding the best new papers and how to get the most out of themMay 5, 20203May 5, 20203
Useful Registers in AssemblyAs someone who occasionally reverse-engineers binaries, whether for analysis purposes or for a CTF, it can be difficult to remember the…Jan 6, 2019Jan 6, 2019
Published inHackerNoon.comFPGAs, SoCs, Microcontrollers— A Quick Rundown of IoT DevicesIf you’re new to the world of IoT, chances are you’ve heard a number of terms and acronyms thrown around and wondered about their…Dec 26, 20181Dec 26, 20181
Linux Manjaro —What to do on Forced ShutdownI recently came across problems from my laptop running out of power and forcing shutdown while it was in hibernation. When I later booted…Dec 26, 2018Dec 26, 2018
Published inHackerNoon.comPower Management for macOSI’ve been using Activity Monitor for years to monitor my CPU and memory usage, but I was beginning to wonder if it might be possible to…Mar 28, 20181Mar 28, 20181
Published inHackerNoon.comA Beginner’s Guide to Vim CommandsA glossary of cheatcodes for your code editorJan 4, 2018Jan 4, 2018
Published inAthena TalksGrace Hopper 2017: A RecapAnother Grace Hopper Celebration has come and gone, but the inspiration, excitement, and community certainly haven’t. I had the opportunity…Oct 7, 2017Oct 7, 2017