//commented out
  • about
  • home
  • Search
✕
    • What Racquet Is That?

      Training a Deep Learning Model to Distinguish Between Lookalike Sports Gear

      Posted on April 16, 2025

      In this project, we train a deep learning model to recognize four types of sports racquets - badminton, tennis, squash and pickleball. They may look similar, but telling them apart can actually be quite tricky! This blog post is based on a hands-on Jupyter Notebook, so you can follow along... [Read More]
      Tags:
      • deep learning
      • computer vision
      • image classification
      • fastai
      • pytorch
      • machine learning projects
    • Going Serverless in Java

      Navigating the Pros and Cons of Using Java in Serverless Environments

      Posted on October 3, 2022

      With the rise of serverless computing, many developers wonder if Java is still a viable option for building serverless applications. While there are some challenges to using Java in a serverless environment, there are also many benefits to using this popular programming language. [Read More]
      Tags:
      • Java
      • Serverless
      • AWS
    • Federated Authentication - An Overview

      Understanding the Differences and Use Cases of OpenID, OAuth, and SAML

      Posted on February 5, 2021

      Federated authentication is a method of linking a user’s identity across multiple separate identity management systems, allowing them to seamlessly access multiple platforms using a single set of credentials. This approach to identity management helps to improve the user experience and increase security by eliminating the need for multiple usernames... [Read More]
      Tags:
      • IAM
      • Authentication
      • Authorization
      • Security
    • Sensitive data showing up in Crash Dump

      How to prevent memory leak and secure your application

      Posted on November 21, 2020

      Before a software is released commercially it undergoes several security scans and tests usually by the Application Security Team or as a part of the DevSecOps process. One such step in this process is the Crash Dump Analysis also called Memory Dump Analysis. To perform this analysis we first record... [Read More]
      Tags:
      • Application Security
      • OWASP
    • Clone HTTP requests from browsers to Postman

      Posted on August 2, 2020

      Quite often during web development, we need to fiddle with the outgoing web requests from our web browsers. E.g. we may want to change the content of POST requests’ body or change the value of an HTTP header. If we are using Chrome, it is not possible to alter the... [Read More]
      Tags:
      • Development
      • Tools
      • Postman
      • Chrome
      • Firefox
    • Older Posts
    • GitHub
    • LinkedIn
    • StackOverflow

    Thank you Beautiful Jekyll for this theme.