🌟 Join our Techኢት discussion group and be part of our community! 🚀💻
Share insights, ask questions, and connect with fellow tech enthusiasts. 🗣️🤝
let's learn and grow together!
🌐 JOIN HERE
#DiscussionGroup #TechEth
@TechInEthio
Share insights, ask questions, and connect with fellow tech enthusiasts. 🗣️🤝
let's learn and grow together!
🌐 JOIN HERE
#DiscussionGroup #TechEth
@TechInEthio
Telegram
discussion Group
Discussion Group share your ideas here
🔥3👍1
An engineer who landed a $300,000 job at Google shares the résumé that got him in the door — and 3 things he'd change on it today
Sahil Gaba was about to graduate with a master's degree in mechanical engineering when he realized the appeal of computer science.
Sahil Gaba taught himself programming to secure his first job at a small fintech and then at Amazon.
When he was 29, he managed to land offers from Meta, Uber, and Google within weeks of each other.
Here's the resume that got him in the door at Google. Read More.
@TechInEthio
Sahil Gaba was about to graduate with a master's degree in mechanical engineering when he realized the appeal of computer science.
Sahil Gaba taught himself programming to secure his first job at a small fintech and then at Amazon.
When he was 29, he managed to land offers from Meta, Uber, and Google within weeks of each other.
Here's the resume that got him in the door at Google. Read More.
@TechInEthio
❤1👍1😁1
Essential JS DOM Methods! ✨
Discover the power of JavaScript DOM manipulation. 💻🚀
Learn key methods for selecting elements, modifying content, and handling events. 🌐
@TechInEthio
#JavaScript #DOMManipulation #WebDevelopment
Discover the power of JavaScript DOM manipulation. 💻🚀
Learn key methods for selecting elements, modifying content, and handling events. 🌐
@TechInEthio
#JavaScript #DOMManipulation #WebDevelopment
⚡3❤1
Forwarded from Codenight Info
Join us for the Codenight Hackathon, a thrilling 5-day event where innovation meets community impact, running from April 9 to April 13!
Whether you're a coder, a designer, or a visionary thinker, if you're up for the challenge of solving problems through Minimum Viable Products (MVPs), we want you! Dive into an environment where solo innovators thrive, and your ideas can shine on their own.
Register https://codenight-hackathon.devpost.com/
Happy hacking!
Whether you're a coder, a designer, or a visionary thinker, if you're up for the challenge of solving problems through Minimum Viable Products (MVPs), we want you! Dive into an environment where solo innovators thrive, and your ideas can shine on their own.
Register https://codenight-hackathon.devpost.com/
Happy hacking!
🔥2👍1
Sam Altman is making the Ultimate AI device - 'The iPhone of AI'
Jony Ive is reportedly developing an AI gadget with OpenAI’s Sam Altman. The two are reportedly discussing what the ‘new hardware for the AI age could look like.’
@TechInEthio
https://youtu.be/rvDT8-o-ifw?si=AXXR35gEg6x1nKGu
Jony Ive is reportedly developing an AI gadget with OpenAI’s Sam Altman. The two are reportedly discussing what the ‘new hardware for the AI age could look like.’
@TechInEthio
https://youtu.be/rvDT8-o-ifw?si=AXXR35gEg6x1nKGu
YouTube
Sam Altman is Making the Ultimate AI Device - "The iPhone of AI"
Sam Altman and Jony Ive are collaborating on an innovative AI device, described as the "iPhone of AI," aiming to raise $1 billion in funding without intending for it to be a smartphone. Amidst this venture, Elon Musk has increased Tesla's AI team salaries…
🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
Ever wondered how your computer securely communicates with a remote server? 🤔
Let's dive into the magic behind SSH and unravel its secrets. 🔍💻
1. What is SSH? 🤷♂️
SSH, or Secure Shell, is a cryptographic network protocol that enables secure communication between two devices over an unsecured network. It's like a secure tunnel for your data! 🚇🔒
2. Key Players: Public and Private Keys 🗝
SSH uses a pair of cryptographic keys – a public key (shared with the world) and a private key (kept super-secret). 🤫 When you connect, these keys perform a digital handshake to ensure a secure connection. 🤝🔑
3. The Handshake Dance: Authentication 💃
The handshake involves your computer proving its identity using the private key, and the server verifying it using the corresponding public key. Think of it as a secret password exchange, but way cooler! 😎🕵️
4. Encryption Enchantment: Securing the Chat 🛡
Once the handshake is complete, SSH wraps your data in layers of encryption, ensuring that even if someone intercepts it, they'll find nothing but gibberish. 🤐📡
5. Port Perfection: Default Port 22 🚪
SSH communicates through port 22 by default. It's like the entrance to your secure data party! 🎉🚪 But beware, changing ports adds an extra layer of security. 🕵️♀️🔐
SSH is the superhero of secure communication, ensuring your data remains confidential, and the connection is trustworthy. 🦸♂️💼 Next time you SSH, remember the cryptographic dance happening in the background, making it all possible! 🕺🌐
Let's dive into the magic behind SSH and unravel its secrets. 🔍💻
1. What is SSH? 🤷♂️
SSH, or Secure Shell, is a cryptographic network protocol that enables secure communication between two devices over an unsecured network. It's like a secure tunnel for your data! 🚇🔒
2. Key Players: Public and Private Keys 🗝
SSH uses a pair of cryptographic keys – a public key (shared with the world) and a private key (kept super-secret). 🤫 When you connect, these keys perform a digital handshake to ensure a secure connection. 🤝🔑
3. The Handshake Dance: Authentication 💃
The handshake involves your computer proving its identity using the private key, and the server verifying it using the corresponding public key. Think of it as a secret password exchange, but way cooler! 😎🕵️
4. Encryption Enchantment: Securing the Chat 🛡
Once the handshake is complete, SSH wraps your data in layers of encryption, ensuring that even if someone intercepts it, they'll find nothing but gibberish. 🤐📡
5. Port Perfection: Default Port 22 🚪
SSH communicates through port 22 by default. It's like the entrance to your secure data party! 🎉🚪 But beware, changing ports adds an extra layer of security. 🕵️♀️🔐
SSH is the superhero of secure communication, ensuring your data remains confidential, and the connection is trustworthy. 🦸♂️💼 Next time you SSH, remember the cryptographic dance happening in the background, making it all possible! 🕺🌐
👏2👍1