top of page
Vishwanath Akuthota
Oct 11, 20237 min read
WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
8270
Vishwanath Akuthota
Oct 9, 20233 min read
Understanding the Fundamental Differences Between Computers and Servers
In the world of technology, the terms "computer" and "server" are often used interchangeably, leading to confusion for many. While both...
150
Vishwanath Akuthota
Aug 19, 20233 min read
The Challenges and Outcomes of Implementing Customer Clustering for Banks Using Machine Learning
Customer clustering is a machine learning technique that can be used to group customers together based on their similarities. This can be...
90
Vishwanath Akuthota
May 23, 20231 min read
Python Script to Connect any DB by ODBC
Certainly! Here's an example of a Python script that demonstrates how to use the ODBC connector to connect to a database and execute a...
130
Vishwanath Akuthota
May 23, 20232 min read
State of AI 2023
The year 2023 is projected to witness further advancements in the field of Artificial Intelligence (AI), building upon the progress made...
40
Vishwanath Akuthota
Jan 10, 20232 min read
The Most Important Libraries For Python đ
As such, the programming language has numerous applications and has been widely adopted by all sorts of communities, from data science...
70
Drpinnacle
Aug 5, 20222 min read
Learnings from Parle-G business model
Parle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...
1420
Vishwanath Akuthota
Jul 27, 20227 min read
What is Machine Learning Ops
In this article, weâll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...
220
Vishwanath Akuthota
Jun 14, 20221 min read
An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
2450
bottom of page