Simple username/password login is pretty much extinct today. Most services today have moved on to rely on more refined and secure forms of user authentication systems. These include encryption, hashing, the use of salt and pepper, and even 2FA with messages or emails. So given that, it is fundamental to know about authentication systems to […]
Author: Syed Umar Bukhari
Syed Umar Bukhari lives south of the ocean. He is a published author, writer, and poet who has worked as an editor and proofreader on countless promising and burgeoning projects. He loves to explore
mental health—depression, anxiety and OCD—and hopeless romance through his alliterative writings on his blog--- Panacea of Rhapsody. He is inspired by timeless writers and poets like John Keats and Pablo
Neruda with their affinity for love and semantics. He is also currently pursuing a career in computer science, leaning towards AI/ML and data science with a flair for SQL and Python.
He plans to publish his third book in the fall of 2021. His first two books were previously published on
Amazon: Six Times Forever and Avaricious Alphabets.
You have surely used one free cloud storage service to store something… for backup, right? I know I have. Tell you what, I lost a whole book recently because I forgot to back it up. So, trust me when I tell you, a cloud storage service is essential in 2022. In this post, I will […]
Before looking at biometric authentication in python with fingerprint matching, I want to explain the concept behind it. Why do you need an authentication system? Why should you build it without weaknesses? I’ll answer that and more with a basic program in python. Then, I’ll explore what authentication in python means with face recognition and fingerprint matching. […]
Smart contracts in Python? Don’t worry if that line doesn’t make sense. So, this post will explore the steps of deploying smart contracts in Python and help you understand how to do it independently and concisely. Like my previous one, where I discussed how to Write Your First Smart Contract || Blockchain, I will break […]
Face Recognition in Python: A Beginner’s Guide will be an utterly fascinating post about something that is both scary and amazing– face detection and analysis using artificial intelligence in Python. How cool is that? How terrifying is that? Before getting into it, I think it’s important to lay some ground framework. I’ll list a few […]
Hence, define the function store (which stores someone’s favourite number), passing a variable to store a number input from the user. Assign the favourite number variable created above (with public scope) to the local variable passed in the function.
Today, multiple flavors of SQL databases exist with versatile use cases, like MySQL and Postgres databases. It ends up being a hard choice: which SQL database do you want to use, which SQL database does your organization use; which SQL database is in the most demand? Our post Picking The Right SQL Database For You […]
Normalization of database is an essential skill to know as a database designer and developer. I still remember being intimidated by what it would bring on– back when I took a SQL database course. It was scary hearing about it. Let me assure you: it is easier than you might imagine. What is important though, […]