Comparing Rust and Go for Systems Programming
An in-depth analysis of performance, safety, and developer experience.
Read MoreWould you like a guided tour of this site?
Full-stack developer specializing in interactive applications and secure systems
const Developer = () => { const skills = ['NextJS', 'React', 'TypeScript']; const passion = 'Building intuitive interfaces'; return ( <Portfolio skills={skills} passion={passion} available={true} /> ); }
Explore my recent work
A deep learning model that analyzes text sentiment in real-time using LSTM networks and attention mechanisms. Built with PyTorch and deployed with Flask.
A distributed application tracking product journey from factory to consumer with immutable records. Built with Solidity smart contracts and Ethereum.
An augmented reality application for interactive learning experiences. Using ARKit and Unity to create immersive educational content.
A visualization tool for distributed algorithms and consensus protocols. Simulates network partitions, node failures, and Byzantine scenarios.
An interactive platform for visualizing and understanding quantum algorithms. Includes simulations of Shor's, Grover's, and QAOA algorithms.
Technologies I'm currently learning
Tracking my path to Certified Information Systems Security Professional (CISSP)
Provider: ISCΒ²
Mastering security concepts, principles, and compliance requirements.
Understanding data classification, ownership, and protection methods.
Learning secure design principles and security models.
Studying secure network architecture and network components.
Managing identification, authentication, and access control.
Conducting security control testing and vulnerability assessments.
Implementing incident management and disaster recovery.
Applying security in the SDLC and understanding security controls.
Thoughts and insights on technology
An in-depth analysis of performance, safety, and developer experience.
Read MoreSmall details that create memorable user experiences in web applications.
Read MoreUnderstanding how to implement privacy-preserving authentication.
Read More