Hack Unitedblog.hackunited.org·Aug 23, 2024Getting Ready for Your First HackathonBy Sahana Prakash Hackathons are like the ultimate playgrounds for tech enthusiasts, where creativity 🤯, collaboration 🤝, and coding 💻 collide to solve real-world problems in an exciting and fast-paced environment. If you're gearing up for your f...Discussready
Namra Ajmaldatanerd.hashnode.dev·Aug 18, 2024Mastering Counting Sort: A Comprehensive GuideWhat is Counting Sort? Counting sort is a linear sorting algorithm that sorts the elements of an array by counting the number of occurrences of each unique element in the array. The count is stored in an auxiliary array (auxiliary is just a fancy wor...Discuss·1 likeBlogging
Githmi Hasharagithmihashara.hashnode.dev·Aug 4, 2024Building Real-Time Communication with WebSockets and Zego CloudIntroduction In the age of instant messaging, real-time communication has become a cornerstone of modern web applications. Whether it's receiving a message, sharing a video, or participating in a live call, users expect instantaneous responses. This ...Discuss·26 readstechnology
Bipson Mukhiyabipsonmukhiya.hashnode.dev·Aug 2, 2024My Path to ISC2 Certified in CybersecurityAs I sit here, reflecting on my recent achievement of becoming ISC2 Certified in Cybersecurity, I can't help but marvel at the journey that brought me to this point. It's a journey that I believe many students can relate to – one filled with exciteme...Discuss·2 likes·142 reads#cybersecurity
Ronald Bartelshubandspoke.amastelek.com·Jul 11, 2024🦓Best Practices are Doomed to Failure if Implemented Blindly😎In theory, there is no difference between theory and practice. But, in practice, there is." Jan LA van de Snepscheut. The prevalent view is to provide a set of best practices that span all IT disciplines. This is also often referred to as benchmarki...Discussbest practices
Ronald Bartelshubandspoke.amastelek.com·Jul 7, 2024🚀 Cybersecurity Lessons from the Challenger Disaster | Risk Assessment & Preparedness🌐In the annals of history, the Space Shuttle Challenger disaster stands as a stark reminder of the catastrophic consequences that can arise from poor decision-making and a lack of thorough risk assessment. On that fateful day in January 1986, the shut...DiscussChallenger
Ronald Bartelshubandspoke.amastelek.com·May 27, 2024🪛Crafting a Comprehensive Request for Information (RFI) in IT Projects ❓Requests for Information (RFIs) and Requests for Proposals (RFPs) are often extensive documents, primarily focused on procurement compliance. However, clarity on the solution's details is often lacking. In this article, we'll dive into the essential ...DiscussRequest for Information
Ronald Bartelshubandspoke.amastelek.com·Apr 21, 2024🧟♂️Dealing with Ghost Information Technology (GIT), the prevalence of Alzheimer like induced Kit within Data Centres🏚️When a cyclist passes on while on the road it is traditional to leave a ghost bike at the spot where he was last alive. This is known as a ghost bike. In Information Technology (IT) we have something similar known as ghost servers. These servers are ...DiscussGhosts
Farhan Naqvifarhanbytemaster.hashnode.dev·Apr 2, 2024How context window of LLMS cause hindrance in RAG appsA comprehensive overview of the challenges posed by restricted context windows in Retrieval-Augmented Generation (RAG) apps:. Token Limit and Context window in RAG: Large Language Models (LLMs): RAG models often rely on pre-trained LLMs for the gene...DiscussAI
Ronald Bartelshubandspoke.amastelek.com·Mar 30, 2024🔥The Demise of Information Technology's Rusty Locks 🚀🔒In the fast-paced world of technology, the only constant is change. Mechanical hard drives, affectionately called "spinning rust," have been outpaced by sleek solid-state drives. Similarly, the cybersecurity landscape has seen a monumental shift, ren...DiscussFirewallsRusty Locks