• A Gamer's Bliss

  • Where Ideas Evolve

  • Minimalism
    Never Goes Outta Style

python snake cartoon

Draw My Life

How did I target the world's top schools despite being an average student? Holding offers and scholarships from University of Illinois, Northeastern, Melbourne, etc. here's my personal-statement from one such application.
python snake cartoon

Math for Data Science

Machine Learning is just a fancy term for Statistics. And to get through ML, one needs a good understanding of Linear Algebra, Calculus and Probability Theory. Thus, I have composed a quick lookup for all the mathematical concepts taught to me in my first two semester of MS.
diabetes - pills and injection

ML in Healthcare

Using classification to improve diabetes diagnostics by computing factors that may affect insulin levels.
python snake cartoon

Python Quickstart

I have been coding in Python, on and off, for two years now. Yet every time I am about to start a new project, I look for those quick recap videos on YouTube. But none seems to cater my explicit requirements, thus after a long overhaul, I came up with my version of a Python notebook that covers the topics relevant to the analytics domain.

Top Challenges Faced by Growing Organisations

Growing organisations face a number of issues ranging from investing in technology to taking appropriate measures to secure it. As the business grows, it demands enhanced security layers and better solutions for newer problems.

Introduction to Databases

While people are busy learning about the much hyped Python and R programming languages, they often neglect the basic querying concepts. And without a database, Data Science seems quite meaningless.
laptop, bug and bomb

PETYA Ransomware 2.0

Petya, generally, is the term for a ransomware program which targets Microsoft Windows based systems by infecting the MBR and demands virtual money to release the files uninfected.

Face Recognition

Detecting and identifying faces using KNearestNeighours and Haar Cascades.
laptop, bug and bomb

Cyber Intelligence Reporting

Security-Intelligence refers to real time monitoring and analysis of critical data that has the potential to impact an organisation, both in terms of reputation as well as capital.

In-house vs Cloud Server

Cloud computing is comparatively new but tends to hold great potential in terms of upcoming applications. Keeping its benefits aside, let’s start from the base level to rule out the better alternative among Cloud and Physical servers.
laptop, tablet, cloud

End to End Encryption

End to end encryption is an enforced algorithm for communication between two endpoint devices, to prevent a third party from accessing the packets between these clients.
envelope and hands

Data Loss Protection

Data Loss Protection is the practice followed to restrict movement of data outside the organisation and is highly recommended to avoid misuse of proprietary information or other sensitive material.
amazon logo with cart

Amazon Stores

After acquiring Whole Foods for a whooping $13.7 Billion, Amazon drops another bomb by patenting a new technology to restrict its customers from comparing rival’s products, while in amazon stores.
magnifying glass

Lost & Found Portal

A website to report items lost and/or found in college, built using Bootstrap, MySql and PHP.

Essential PH-1

Essential Products, headquartered in Palo Alto, California was founded by Andy Rubin. Andy, the current CEO of Essential Products is an American programmer, engineer and an entrepreneur who was also one of the co-founders of Android.
people exchanging notes


Developed a website to share academic material like notes, eBooks and projects.


Each time someone buys a product from the series RED, Apple sends a contribution to the global fund which uses the entire amount of contribution to finance HIV/AIDS programs that help people affected with HIV in Ghana, Lesotho, Rwanda, South Africa, Swaziland, Tanzania, Kenya, and Zambia

Zip Bomb

A zip bomb, also known as a zip of death or decompression bomb, is a malicious archive file designed to crash the program or system reading it.
message logo

Chat Room

Full duplex communication channel between Server and Client by binding sockets in C.

IaaS vs PaaS

Acronyms SaaS, PaaS and IaaS are heavily used in cloud computing industries and are the models for online services that a cloud offers. The “Cloud” is a very broad concept otherwise but let’s just focus on a few services that it offers.
http protocol and lock


HTTP stands for HyperText Transfer Protocol and is used to control the transfer of content over the web. The content may vary from miniature texts to heavy graphic files. This protocol was developed by Ted Nelson and came out in 1991 with its successors in 1996, 1997 and 2015.
usb cable

USB Type-C

USBs have been a very part of our computing needs but only a few of us would be knowing what it stands for. And that’s Universal Serial Bus. Going by it’s nomenclature, type-C looks like a bump to the trend for standardising the connection peripherals. For those, still unaware of the new form-factor of the USB port, here’s the visual to explain why is USB type-C a big deal!
www and domain extensions

Domain Extensions

Question arises, how domain extensions work and what impact do these have on the internet market. For all the curious minds out there, here’s a list of the existing common extensions:
  • .com
  • .net
  • .org
  • .in
  • .us
  • .xyz
  • .website

Fork Bomb

A fork bomb aka Rabbit Virus is a denial-of-service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.