Encryption schemes have evolved tremendously over the past decades, and homomorphic encryption (HE) is one of the most fascinating areas. … More
Author: Sefik Serengil
A Step by Step Partially Homomorphic Sander-Young-Yung Example In Python
Modern cryptography is not only about protecting data from unauthorized access, but also about enabling computation on encrypted information. This … More
Introducing Brand New Face Recognition in DeepFace
As humans, recognizing a person is often similar to matching someone we see with the people we already know or … More
Using Peer Reviews as Evidence in US & UK Extraordinary Talent Visas
When applying for extraordinary talent visas such as the US EB-1A, EB-2 NIW, or the UK Global Talent Visa, applicants … More
7 Myths About the UK Global Talent and US Extraordinary Ability Visas
Applying for a talent-based visa can be confusing. Whether you’re thinking about the UK Global Talent Visa or the US … More
A Practical Guide to Graph Traversal in Data Structures and Algorithms
Graphs are a fundamental data structure in computer science, used to model relationships between objects in a wide variety of … More
Building an Atomic, High-Throughput Election System: A System Design Case Study
It’s election night. Millions of citizens have cast their votes, and across the country, hundreds of thousands of ballot boxes … More
A Practical Guide to Dependency Injection and Event-Driven Architecture in FastAPI and Kafka
FastAPI has quickly become one of the most popular frameworks in the Python ecosystem because of its modern design, async-first … More
A Gentle Introduction to Event Driven Architecture in Python, Flask and Kafka
In today’s fast-paced and scalable application development landscape, event-driven architecture (EDA) has emerged as a powerful pattern for building systems … More
How to Calculate Percentage-Based Confidence Scores from Similarities of Embedding Models
Embedding models have become a cornerstone of modern machine learning, powering everything from recommendation engines and document search to verification … More
