Skip to main content
Skip to main content

As we stand on the brink of 2024, 2025, 2026 AI has already established itself as an essential collaborator in the workplace. The relationship between humans and AI is growing, moving beyond just…

Traditional storage methods leave healthcare data vulnerable to financial and reputational damage. However, decentralized systems increase security while reducing the risks and costs of data breaches. Smart contracts ensure user consent is enforced…

That’s where Holistic Testing comes in. Instead of testing one variable (e.g., the CTA button text), you test a set of variables, which are all supporting the same hypothesis. Get the Latest in…

In my tech journey, I’ve always had an affinity for the cutting-edge, the not-fully-tested waters of the Linux world. Rolling release distributions like Arch, Fedora, or even a custom-installed Kali Linux have been…

The sudo command in Linux is one of the most important and widely used commands for managing system permissions. It allows you to run a command as the superuser, giving you elevated privileges…

This page is part of my digital garden. It is more like a notebook entry than a polished blog post. It’s a space where I document learnings primarily for my own reference, yet…