GPU: A General-Purpose Accelerator
Video cards are ubiquitous in almost every commercial PC/laptop sold in the modern era, and even some mobile phones and tablets have GPUs.
(Reading: 28 minutes)
Probing Real-World Cryptosystems
In Sun Tzu's book "The Art of War", he writes, "Attack is the secret of defense; defense is the planning of an attack".
(Reading: 74 minutes)
Privacy at your Fingertips
Differential Privacy is a mathematical framework that prevents an analyst from leaking information when querying a data store.
(Reading: 83 minutes)
Authoring a new book on Distributed Computing
### Writing a book titled "Distributed Computing From First Principles" Following the availability of high-quality free textbooks such as *[A Graduate Course in Applied Cryptography](https://crypto.
(Reading: 18 minutes)
Distributed Computing From First Principles
Have you ever wondered how a typical distributed system works under the hood? Are you looking for a pedagogical guide with complete implementations and tricks of the trade? Look no further and read my writing on the topic.
(Reading: 173 minutes)
Metamorphic Testing in a Nutshell
“Building the product right versus building the right product” is a popular cliché used to describe the product-market fit.
(Reading: 32 minutes)

Please feel free to donate to support my work by clicking donate here


<< Newer posts  |   Older posts >>   Page: 1 / 3 | Total: (6 / 14 )