Author: Arunangshu Das

Trust me, I'm a software developer—debugging by day, chilling by night.

In the digital age, two terms often surface in discussions of security and access control: authentication and authorization. While these concepts are closely related, they serve distinct functions in safeguarding systems, data, and resources. Understanding the difference between authentication and authorization is crucial for anyone looking to enhance their digital security skills or manage access to online systems effectively. Introduction to Authentication and Authorization Authentication and authorization are foundational components in digital security, but they focus on different aspects of user access. Authentication verifies the identity of a user, while authorization determines what resources or data that identified user can…

Read More

In today’s digital landscape, creating an inclusive experience on the web is not just a trend—it’s a necessity. Web accessibility refers to the practice of designing and developing websites so that people with various disabilities can perceive, understand, navigate, interact with, and contribute to the web. Emphasizing accessibility in web development isn’t just about fulfilling legal obligations; it’s about creating a more equitable internet for everyone. In this blog post, we’ll explore the key aspects of accessibility, why it’s critical, and how web developers can implement accessibility practices to build a more inclusive web. What is Accessibility in Web Development?…

Read More

The rendering process in web browsers is complex and intricate, responsible for translating raw code (HTML, CSS, JavaScript) into the visual experiences we interact with daily on our screens. Understanding how this rendering works is not only valuable for developers seeking to optimize their web applications but also for anyone interested in the mechanics of the modern internet. 1. The Basics: What is a Web Browser? A web browser is a software application that retrieves, presents, and interacts with content on the internet. Popular browsers include Chrome, Firefox, Safari, Edge, and Opera. Each of these browsers shares the same core…

Read More

Introduction In the evolution of computer vision, Convolutional Neural Networks (CNNs) have moved from experimental concepts to the backbone of modern AI. Two architectures stand as definitive milestones: LeNet-5 and VGG. While LeNet-5 (1998) proved that machines could “see” handwritten digits, VGG (2014) demonstrated that sheer depth could conquer massive, real-world datasets. This article breaks down the architectural shift from the simplicity of the 90s to the deep-learning revolution of the 2010s. LeNet-5: The Pioneer of Computer Vision Developed by Yann LeCun, LeNet-5 was the first functional CNN to achieve commercial success, famously used by banks to read zip codes…

Read More

Introduction to Regression in Deep Learning Regression is a fundamental concept in machine learning and deep learning, where the goal is to predict continuous values. From predicting house prices to forecasting stock trends, regression models serve as the backbone of many practical applications. Deep learning, with its ability to handle complex and high-dimensional data, takes regression to new heights, enabling solutions to problems that traditional regression models struggle to address. What Is Regression? Regression refers to a supervised learning technique where the objective is to predict a numeric output based on input features. Unlike classification, which deals with discrete labels,…

Read More

Introduction Deep learning has witnessed significant advancements over the decades, and LeNet-5 stands out as a foundational milestone. Developed by Yann LeCun and his collaborators in 1998, LeNet-5 was a revolutionary convolutional neural network (CNN) that demonstrated the power of convolutional architectures for tasks like handwritten digit recognition. Its contributions to the field of deep learning paved the way for the sophisticated models we use today. A Glimpse into the Era of LeNet-5 In the 1990s, machine learning was still in its infancy, and most models relied on handcrafted features combined with basic classifiers. Neural networks were gaining traction, but…

Read More

In today’s digital landscape, web applications are exposed to various security vulnerabilities, with Cross-Site Scripting (XSS) attacks being one of the most common and dangerous. XSS attacks exploit security weaknesses on the client side, allowing attackers to inject malicious scripts into web pages viewed by users. When these scripts are executed, they can steal sensitive information, hijack user sessions, redirect users to malicious websites, and more. What is an XSS Attack? Cross-Site Scripting (XSS) is a type of injection attack where an attacker injects malicious scripts into content from otherwise trusted websites. These scripts are executed in the user’s browser…

Read More

In today’s fast-paced digital landscape, speed and reliability aren’t just advantages—they are survival requirements. CI/CD, standing for Continuous Integration and Continuous Delivery/Deployment, represents the gold standard of modern software engineering. By automating the journey from a developer’s keyboard to the end-user’s device, CI/CD minimizes risks, eliminates manual bottlenecks, and ensures a constant flow of value. 1. Decoding the CI/CD Framework Understanding CI/CD requires breaking down the pipeline into its functional halves. While often grouped together, they solve different parts of the development puzzle. What is Continuous Integration (CI)? CI is the practice of merging all developer working copies to a…

Read More

In the world of DevOps, containerization has become a transformative technology, reshaping how applications are developed, deployed, and managed. By packaging software in “containers,” teams can create isolated environments that bundle an application with its dependencies, allowing for consistent operation across various environments. This guide will dive into how containerization works in DevOps, its advantages, and how it supports a streamlined development-to-deployment pipeline. What is Containerization? Containerization is a form of virtualization at the OS level, where applications are packaged along with all the libraries, dependencies, and configurations they need to run. Unlike traditional virtual machines, which virtualize entire operating…

Read More

In today’s fast-paced digital landscape, the deployment pipeline has become a crucial part of software development and operations. It is designed to streamline the process of taking code from development to production, ensuring that software is consistently delivered to users with speed, efficiency, and reliability. A deployment pipeline is not just a technical structure; it is a strategic asset that improves collaboration, quality, and the adaptability of software in production environments. In this post, we’ll dive into the purpose of a deployment pipeline, its components, and how it enhances the entire development lifecycle. What is a Deployment Pipeline? A deployment…

Read More