-
๐ฎ๐ฌ๐ฎ๐ฐ: ๐ ๐ฌ๐ฒ๐ฎ๐ฟ ๐ผ๐ณ ๐๐ ๐ฑ๐ผ๐บ๐ถ๐ป๐ฎ๐ป๐ฐ๐ฒ, ๐ฆ๐ต๐ถ๐ณ๐๐ถ๐ป๐ด ๐น๐ฎ๐ป๐ฑ๐๐ฐ๐ฎ๐ฝ๐ฒ๐, ๐๐ป๐ฒ๐๐ถ๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฎ๐ฐ๐ธ๐
As we close out 2024, itโs worth reflecting on a year that showcased the tech industry’s highs and lows. Here’s a quick recap of what I thought were the biggest stories that shaped the year: ๐ ๐๐ ๐ง๐ฎ๐ธ๐ฒ๐ ๐๐ต๐ฒ ๐๐ฟ๐ผ๐๐ปAI continued to be the driving force dominating the tech landscape,… View โข
-
Large Language Models
A small reminder about Large Language Models (LLMs): LLMs are exactly that โ models trained to predict the next word based on the given context. While they excel at generating coherent text, it’s essential to remember: They lack true comprehension โ Even with advanced techniques like tuning, reinforcement learning, exposure… View โข
-
The Log: What Every Software Engineer Should Know
Consulting for a large UK based International Bank where the primary focus is on scaling challenges. I read this article many moons ago but many of nuance, yet fundamental concepts eluded me. Sometimes visiting the same material with expanded knowledge provides a refreshing perspective. While the specific tooling/hardware evolves, many… View โข
-
The falling giant: Intel’s Demise
Intelโs Demise from glory ๐ป ๐ There was a time where I remember virtually every computer had an Intel microprocessor. However, Intel’s market share has recently declined significantly, dropping from an estimated ,$80 billion to $53 billion. Intelโs fall from grace attributed to several factors: 1. Intel was slow to… View โข
-
a.i. – brief history
The journey of AI in the past decade has been eventful, to say the least, thou its roots extend much further back. There have been numerous milestones and achievements by mathematicians, scientists, and engineers alike; however if I were to highlight three key milestones, they would be: – 1950: Turning… View โข
-
OWASP Top 10 Vulnerabilities
Open Web Application Security Project (OWASP) Founded in 2001 the Open Web Application Security Project is a non-profit global organization that strives to promote application security across the web. One of OWASPโs core principles is that all of their materials will be freely available and easily accessible making it possible… View โข
-
In the Big-O notation
In computer science the Big-O notation is used to describe the performance or the algorithmic complexity of an algorithm. This short post will describe some of these notations. To demystify the simple math behind these notations we shall use straightforward Java code examples. The notations we shall explore are the… View โข
-
Java Features: Brief history
Introduction In this post am are going to look at some of the new features introduced to the Java language from versions 7,8,9,10,11 & 12. By no means should this list be considered as a comprehensive feature list, but I shall aim to capture some of the more striking features… View โข
-
Design Patterns โ The when viewpoint
Inevitably throughout your career you will come up across problems that have already been solved in one way or another. This blog is NOT going to describe the common design patterns as stated by the GOF in 1994; there are plenty of good blogs that do that. Alternatively, this post… View โข
Meet the tech consultant & content creator, Ithar Malik.
Tech veteran with 20+ years of tech adventures & still geeking out! Started when XML was cool, now playing with AI. Talk about a tech journey! ๐
BSc Artificial Intelligence graduate before ChatGPT was a thing. MSc Internet Computing to keep it real.

