Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Levels of Programming Languages (2024 version)Programming languages are categorized into various levels based on how closely they interact with the hardware or the abstraction level…6d ago6d ago
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Role of Unstructured Data in Data ScienceIntroductionSep 26Sep 26
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Mobile Development and Operating SystemsWhat is Mobile Application Development?Sep 25Sep 25
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]PATCH MANAGEMENT — Backbone of Security & Compliance StrategyYou must have heard about the zero-day vulnerability that took all news headlines. That is where organizations distribute patch updates to…Sep 25Sep 25
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Federated Learning: A New Paradigm in Machine LearningFederated learning is an innovative approach to machine learning that enables the training of algorithms across decentralized devices or…Jul 14Jul 14
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]What is Egress Filtering?Numerous network administrators & security professionals think that protecting their private network and resources from external threats is…Jul 12Jul 12
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]A Note on Artificial Intelligence (AI) Challenges (Part 1 — The Basics)Artificial Intelligence (AI) is progressing significantly, hitting its stride every moment. From automation to intelligent management &…Jul 12Jul 12
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Identity as a Service (IDaaS) and its FunctionalitiesIn the wake of data leakage scandals, organizations are turning towards Identity as a Service (IDaaS) solutions. But what is IDaaS?Jun 25Jun 25
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Top 5 Computer Vision Applications in Artificial IntelligenceIntroductionMay 14May 14
Karlos G. Ray [Masters | BS-Cyber-Sec | MIT | LPU]Decentralized System and Identity: The Future of TechnologyIntroductionApr 29Apr 29