top of page


WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack

Vishwanath Akuthota
Oct 11, 20237 min read


Understanding the Fundamental Differences Between Computers and Servers
In the world of technology, the terms "computer" and "server" are often used interchangeably, leading to confusion for many. While both...

Vishwanath Akuthota
Oct 9, 20233 min read


The Challenges and Outcomes of Implementing Customer Clustering for Banks Using Machine Learning
Customer clustering is a machine learning technique that can be used to group customers together based on their similarities. This can be...

Vishwanath Akuthota
Aug 19, 20233 min read


Python Script to Connect any DB by ODBC
Certainly! Here's an example of a Python script that demonstrates how to use the ODBC connector to connect to a database and execute a...

Vishwanath Akuthota
May 23, 20231 min read


State of AI 2023
The year 2023 is projected to witness further advancements in the field of Artificial Intelligence (AI), building upon the progress made...

Vishwanath Akuthota
May 23, 20232 min read


The Most Important Libraries For Python 🐍
As such, the programming language has numerous applications and has been widely adopted by all sorts of communities, from data science...

Vishwanath Akuthota
Jan 10, 20232 min read


Learnings from Parle-G business model
Parle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...

Drpinnacle
Aug 5, 20222 min read


What is Machine Learning Ops
In this article, we’ll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...

Vishwanath Akuthota
Jul 27, 20227 min read


An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...

Vishwanath Akuthota
Jun 14, 20221 min read
bottom of page