ShekharAn open letter to Tech CEOs mandating 14 hour workdaysKnowledge work is mostly deep work. Deep work requires one to ideate, iterate, focus, and establish/follow best practices. Your best…Aug 10Aug 10
ShekharHow to build a State of the Art Authentication MechanismARGON2, Oblivious Transfer + Password Authenticated Key Exchange Private Set Intersection , TOTP, OIDC/OAuth and Passkey/Passwordless Auth.Apr 25Apr 25
ShekharAsymmetric and Post Quantum Cryptography In DepthWe had already looked at RSA back in this article for Diffie Helman Key Echange in TLS. Let us understand other modern approaches in this…Apr 12Apr 12
ShekharSymmetric Cryptography in DepthEventually in TLS, the actual process of sending and receiving of data is using Symmetric Encryption. Let us take a look at ChaCha20 and…Apr 7Apr 7
ShekharPolyglot mechanisms for High Network IO PerformanceClassic Socket IO, AsyncIO, Non Blocking IO, Reactor, Multi-Reactor, GoRoutines and Virtual ThreadsMar 6Mar 6
ShekharLLMs : From Zero to Hero.These articles are all you need — Vector Search — Part 4Semantic/Vector search differs from Keyword/Similarity search in that Similarity search is like looking for a specific book in a library…Mar 4Mar 4
ShekharSimilarity Search: A Crash CourseSearch/Information Retrieval as explained in RAG eventually ends up being the lynchpin of the entire RAG pipeline. But what is search?Mar 4Mar 4
ShekharLLMs : From Zero to Hero.These articles are all you need — Miscellaneous — Part 5RAG traid, RLHF,DPO, Chunking Best Practices, Advanced Retrieval, Needle in a Haystack, Prompt Tuning and KV CachingFeb 18Feb 18
ShekharThe OpenAI fiasco: The Real Questions To AskSome food for thought. I believe these are the actual questions we should be asking.Nov 20, 2023Nov 20, 2023
ShekharinAWS in Plain EnglishHow AWS S3 Requests Are Authenticated: HMAC-SHA256HMAC-SHA256. Sounds like gobbledygook. What is it really?Sep 10, 2023Sep 10, 2023