An open letter to Tech CEOs mandating 14 hour workdaysKnowledge work is mostly deep work. Deep work requires one to ideate, iterate, focus, and establish/follow best practices. Your best…Aug 10, 2024Aug 10, 2024
Everything About AuthenticationARGON2, Oblivious Transfer + Password Authenticated Key Exchange Private Set Intersection , TOTP, OIDC/OAuth and Passkey/Passwordless Auth.Apr 25, 2024Apr 25, 2024
Asymmetric and Post Quantum Cryptography In DepthWe had already looked at RSA back in this article for Diffie Helman Key Echange in TLS. Let us understand other modern approaches in this…Apr 12, 2024Apr 12, 2024
Symmetric Cryptography in DepthEventually in TLS, the actual process of sending and receiving of data is using Symmetric Encryption. Let us take a look at ChaCha20 and…Apr 7, 2024Apr 7, 2024
Polyglot mechanisms for High Network IO PerformanceClassic Socket IO, AsyncIO, Non Blocking IO, Reactor, Multi-Reactor, GoRoutines and Virtual ThreadsMar 6, 2024Mar 6, 2024
LLMs : From Zero to Hero.These articles are all you need — Vector Search — Part 4Semantic/Vector search differs from Keyword/Similarity search in that Similarity search is like looking for a specific book in a library…Mar 4, 2024Mar 4, 2024
Similarity Search: A Crash CourseSearch/Information Retrieval as explained in RAG eventually ends up being the lynchpin of the entire RAG pipeline. But what is search?Mar 4, 2024Mar 4, 2024
LLMs : From Zero to Hero.These articles are all you need — Miscellaneous — Part 5RAG traid, RLHF,DPO, Chunking Best Practices, Advanced Retrieval, Needle in a Haystack, Prompt Tuning and KV CachingFeb 18, 2024Feb 18, 2024
The OpenAI fiasco: The Real Questions To AskSome food for thought. I believe these are the actual questions we should be asking.Nov 20, 2023Nov 20, 2023
Published inAWS in Plain EnglishHow AWS S3 Requests Are Authenticated: HMAC-SHA256HMAC-SHA256. Sounds like gobbledygook. What is it really?Sep 10, 2023Sep 10, 2023