Published inInfoSec Write-upsNetwork Intrusion Analysis at ScaleAzure, Databricks, and PySpark23h ago23h ago
Published inInfoSec Write-upsAnomaly Detection for CybersecurityAn introduction, a dataset, and some PythonSep 1, 2024Sep 1, 2024
Published inInfoSec Write-upsThe Ultimate Cyber Security Weapon: SharePoint ListsOK, maybe ‘ultimate weapon’ is a bit strong. But hear me out…May 17, 2024May 17, 2024
Published inInfoSec Write-upsScheduled Network Activity Reports using a Simple set of Toolstcpdump -> Python -> GmailMay 13, 2024May 13, 2024
Python OOP: A Simple Diagnostic Test ExampleIn 2022, I completed a course on IT Systems and Design (link) that introduced the theoretical concepts of software development, including…Aug 10, 2023Aug 10, 2023
ELISA Analysis in PythonA common task in many labs is to determine the amount of ‘stuff’ (typically protein) in a sample, quoted in some set of units such as…Aug 10, 20231Aug 10, 20231
Published inTDS ArchiveMarathon Training: A Data PerspectiveAn analysis of data from Strava (via its API)Dec 2, 2021Dec 2, 2021
Published inTDS ArchiveAffimer Proteins: Next Generation Sequencing Data Analysis (Part 2)Amino acid translation and finding Affimer loop regionsJul 20, 2021Jul 20, 2021
Published inTDS ArchiveAffimer Proteins: Next Generation Sequencing Data Analysis (Part 3)Unique molecular identifiers and panning for Affimer BindersJul 20, 2021Jul 20, 2021