top of page


WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
Vishwanath Akuthota
Oct 11, 20237 min read
1,041
0


Understanding the Fundamental Differences Between Computers and Servers
In the world of technology, the terms "computer" and "server" are often used interchangeably, leading to confusion for many. While both...
Vishwanath Akuthota
Oct 9, 20233 min read
23
0


The Challenges and Outcomes of Implementing Customer Clustering for Banks Using Machine Learning
Customer clustering is a machine learning technique that can be used to group customers together based on their similarities. This can be...
Vishwanath Akuthota
Aug 19, 20233 min read
9
0

Python Script to Connect any DB by ODBC
Certainly! Here's an example of a Python script that demonstrates how to use the ODBC connector to connect to a database and execute a...
Vishwanath Akuthota
May 23, 20231 min read
19
0

State of AI 2023
The year 2023 is projected to witness further advancements in the field of Artificial Intelligence (AI), building upon the progress made...
Vishwanath Akuthota
May 23, 20232 min read
4
0

The Most Important Libraries For Python 🐍
As such, the programming language has numerous applications and has been widely adopted by all sorts of communities, from data science...
Vishwanath Akuthota
Jan 10, 20232 min read
7
0


Learnings from Parle-G business model
Parle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...
Drpinnacle
Aug 5, 20222 min read
143
0

What is Machine Learning Ops
In this article, we’ll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...
Vishwanath Akuthota
Jul 27, 20227 min read
22
0

An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
Vishwanath Akuthota
Jun 14, 20221 min read
280
0
bottom of page