Cryptography

In this digital era where we see everything going on so smoothly, there is something which keeps us assured of security and privacy. Passwords are stored when a user signs up, but what if a hacker gets access to this password database? Terms like ‘end-to-end encryption’ used by apps like WhatsApp are fascinating the world,…

Web Scraping

In the ever-evolving data-driven world, web scraping emerges as a powerful tool, providing access to vast knowledge hidden within the web’s depths. Like a skilled magician, it effortlessly extracts valuable information from websites, unlocking doors to data and opportunities. Web scraping forms the foundation of modern decision-making, enabling us to compare prices, analyze trends, and…

Beats & Bytes : The Synergy of Music and Computer Science

IntroductionIn a world where technology is deeply embedded in our lives, the fusion of computer scienceand music has become an interesting frontier. This blog takes a closer look at the dynamicrelationship between these two realms, unveiling the role of algorithms, digital processing,and cutting-edge technologies in shaping the melodies we love. We will unravel thecomplexities of…

Singularity

The Singularity is near when man merges with machine and artificial intelligence surpasses the human mind. – Ray Kurzweil The emergence of superintelligence is a singularity that would be like a black hole. We have no idea what’s on the other side. – Vernor Vinge We’re rapidly approaching a technological singularity, where humankind itself may…

Dive into Web 3.0

The universe of networking and web pages has seen multiple phases, wherein the next phase is usually transitioned from the previous phase gradually, thus making it hard always to give clear-cut differences. Few experts say that we are now slowly transitioning into the third phase – Web 3.0, while others are still of the opinion…

My Experience with Open Source (GSoC)

Why Open Source? Open Source Software is gradually becoming a norm, either as applications nurtured by dedicated users and enterprises or as built-in digital platforms used by millions of people, with Linux leading the pack for a long time. The importance of open-source technology is not only limited to being a low-cost alternative. It also…

Introduction to Recommendation Systems

Ever wondered how sites like Netflix are consistently able to recommend movies or shows you want to watch? Ever been on youtube and wondered how their recommended section works? According to Amazon, an astonishing 70% of their sales come through their recommendations alone. Not only that, over 80% of Netflix’s watch time is due to…

The Dystopian Security

“Since the COVID pandemic, there has been a 47% jump in the severity of ransomware attacks, a 35% increase in funds transfer fraud, and a 67% increase in business email attack”, to cite just a few statistics. This blog post is written to give you insight into the various ways of protecting yourself from cyber attacks. …

Steganography

If someone were to ask you to find the differences between these two images, you’d probably say there were none. And if the same person declares that one of these pictures has been modified, you might think that the person is mistaken. In fact, to the simple, plain eye these images do indeed look unmodified,…