Muhammed ImdaadCryptography and how it is used to secure today’s WIFI networks — part 02Briefly about WIFI6 min read·Jan 1, 2022----
Muhammed ImdaadCryptography and how it is used to secure today’s WIFI networks — part 01Hi all, Hope this article will be beneficial and that you learn something from this. Through this article, I will describe what is…8 min read·Jan 1, 2022----
Muhammed ImdaadPointers in Programming — What, Why, and HowPointers in programming9 min read·Jun 8, 2021----
Muhammed ImdaadHow I made a Custom Bootloader for SoC Firmware Over-the-Air updateThe center theme of my work was to perform a firmware upgrade on STM MCUs that do not have the ability to directly access the remote…5 min read·Apr 8, 2021--1--1
Muhammed ImdaadRTOS 02 - InterTask CommunicationIn this second part of the series, I will elaborate on inter-task communication in RTOS. If you didn’t read part one have a look at it if…5 min read·Dec 14, 2020----
Muhammed ImdaadRTOS 01 - Into Real-time Operating SystemsIn this part one of the series, I will introduce real-time operating systems and it’s advantages in complex projects. In the second part…8 min read·Dec 4, 2020--4--4
Muhammed ImdaadJourney Continues — ScholarX-20Here is my second article on describing my journey through ScholarX program initiated by the Sustainable Education Foundation. We have…3 min read·Aug 29, 2020----
Muhammed ImdaadScholarX 20 -Journey so farHi there! This is my first article on medium. In this article, I will be sharing with you what is my journey so far in Scholarx 2020 by…3 min read·Jul 3, 2020----