Published in HackerNoon.com·PinnedDatabases and Blockchains, The Difference Is In Their Purpose And DesignThere is much confusion as to what a blockchain is and its dichotomy with a database. A blockchain is actually a database because it is a digital ledger that stores information in data structures called blocks. A database likewise stores information in data structures called tables. …Blockchain17 min readBlockchain17 min read
Published in High-Definition Pro·PinnedNFT — An Introduction To The Blockchain For Photographers And CreativesThe blockchain does not seem to relate to anything that has to do with photography or content creation. It is a technology that has been disrupting the finance industry, but it is not exclusive to finance. It is actually a much more transparent way to secure information and verify the…Photography10 min readPhotography10 min read
Published in 0xCODE·PinnedUsing IPFS For Distributed File Storage SystemsIPFS (InterPlanetary File System) is a decentralized storage solution for blockchain-based content. IPFS uses a P2P (Peer-to-Peer) network model for file sharing that is decentralized and distributed across many computers or nodes. Files are broken down into different parts and stored across a network of nodes, that track the file…Ipfs12 min readIpfs12 min read
Published in Geek Culture·Nov 15, 2022Web3 Introduces New Features For The Future Of GamingWeb3 is a software development framework that allows integration with a blockchain. A blockchain provides a verification layer, which can store data immutably without the control of a central authority. It is non-trusted and non-intermediated, so it is less prone to manipulation and censorship. The benefits of this are to…Web38 min readWeb38 min read
Published in 0xCODE·Oct 11, 2022The Brilliance Of Quake’s Fast Inverse Square Root AlgorithmThe game developer of Quake, have made the code to Quake III open source, revealing something interesting for programmers. This is the Fast Inverse Square Root algorithm, as applied in the game engine. This might seem nothing special, since most programming languages already have a function for it, but there…Programming4 min readProgramming4 min read
Published in High-Definition Pro·Oct 11, 2022Some Tips For E-Commerce Product PhotoshootsWith the boom of the Internet, online shopping became a lucrative business. Not only can you sell items locally, but the Internet enables a more global market to have access to anyone selling products online. This allows a wider reach for businesses using what is called e-commerce. …Photography9 min readPhotography9 min read
Published in 0xMachina·Oct 4, 2022Does The Tesla Bot Have A Future?Tesla has unveiled a prototype of the Tesla Bot (Optimus) during their AI Day 2022 on September 30. Appearing on stage was an untethered version of the robot, which revealed a humanoid form. The Tesla Bot was first presented in a 2021 AI Day event, without much clarity on its…Tesla9 min readTesla9 min read
Published in 0xCODE·Sep 27, 2022Fast Fourier Transform (FFT) Algorithm Implementation In PythonFast Fourier Transform (FFT) are used in digital signal processing and training models used in Convolutional Neural Networks (CNN). We demonstrate how to apply the algorithm using Python. FFT has many applications in component analysis. One application of FFT is in digital signal processing. It can be used as a…Python6 min readPython6 min read
Published in High-Definition Pro·Sep 19, 2022Do Photographers Need To Use Social Media?When the social media revolution exploded back in the early 2000’s, it introduced a new world of content sharing and experiences to users on the Internet. It further gained adoption with devices like the iPhone (i.e. smartphones) and apps like Instagram. …Photography10 min readPhotography10 min read
Published in The InfoSec Journal·Sep 13, 2022WiFi Security Update — The WPA3 ProtocolWiFi needs an overhaul in its security protocol, as it is becoming easier to capture encrypted data traffic. WPA3 (Wi-Fi Protected Access 3) is the standard proposed by the Wi-Fi Alliance for certified devices starting in 2018. This is the third iteration for security encryption of data traffic that uses…Cybersecurity4 min readCybersecurity4 min read