Muhammed ImdaadCryptography and how it is used to secure today’s WIFI networks — part 02Briefly about WIFIJan 1, 2022Jan 1, 2022
Muhammed ImdaadCryptography and how it is used to secure today’s WIFI networks — part 01Hi all, Hope this article will be beneficial and that you learn something from this. Through this article, I will describe what is…Jan 1, 2022Jan 1, 2022
Muhammed ImdaadPointers in Programming — What, Why, and HowPointers in programmingJun 8, 2021Jun 8, 2021
Muhammed ImdaadHow I made a Custom Bootloader for SoC Firmware Over-the-Air updateThe center theme of my work was to perform a firmware upgrade on STM MCUs that do not have the ability to directly access the remote…Apr 8, 20212Apr 8, 20212
Muhammed ImdaadRTOS 02 - InterTask CommunicationIn this second part of the series, I will elaborate on inter-task communication in RTOS. If you didn’t read part one have a look at it if…Dec 14, 2020Dec 14, 2020
Muhammed ImdaadRTOS 01 - Into Real-time Operating SystemsIn this part one of the series, I will introduce real-time operating systems and it’s advantages in complex projects. In the second part…Dec 4, 20204Dec 4, 20204
Muhammed ImdaadJourney Continues — ScholarX-20Here is my second article on describing my journey through ScholarX program initiated by the Sustainable Education Foundation. We have…Aug 29, 2020Aug 29, 2020
Muhammed ImdaadScholarX 20 -Journey so farHi there! This is my first article on medium. In this article, I will be sharing with you what is my journey so far in Scholarx 2020 by…Jul 3, 2020Jul 3, 2020