Why Human Talent Remains Irreplaceable in Modern MarketingThe marketing and design landscape today feels fundamentally different than it did just a decade ago. AI tools are capable of generating…May 10May 10
The Power of Words: Prompt Engineering and JailbreaksChatGPT, Gemini, Deepseek…Large Language Models (LLMs) are becoming increasingly integral to our daily lives. But have you ever stopped to…Feb 19Feb 19
Let’s play with Nim; The substitution cipherA substitution cipher is a simple encryption technique where each letter in the plaintext is substituted with another letter.May 20, 2024May 20, 2024
Running IBM Z Open Editor on ChromebookInner voice 1: I think we might run VS Code but running IBM Z Open Editor on this one will be a problem, java, node etc, etc.Mar 25, 2024Mar 25, 2024
Over-the-Air (OTA) Updates: A Double-Edged Sword for AutomakersWell, I decided to write a follow-up blog post about car security, and I have been that student who’s never afraid to ask questions. You…Nov 27, 2023Nov 27, 2023
Wardriving: What sorcery is this?In an era dominated by the internet, wireless connectivity has become an indispensable part of our daily lives. As we seamlessly connect…Nov 20, 2023Nov 20, 2023
Data Encryption in the Cloud: Understanding the Offerings of Azure, AWS, GCP, and IBM CloudAs I promised in my last article, today I’ll try to share what I learned about the data encryption solutions offered by different cloud…Nov 20, 2023Nov 20, 2023
Cloud Security Basics: Protecting Your Digital Assets in the Cloud & Personal JourneyMy journey towards achieving the Professional Cloud Security Engineer Certification began around early September, Thanks my friend Graham…Oct 2, 2023Oct 2, 2023
The Developer Certificate of Origin (DCO)Well you, if you like me, you would love to contribute an open source project. You find one, land their Project site on GitHub, and… see…Aug 27, 2023Aug 27, 2023