A Practical Guide to Systematic Reviews

This article describes how to do a systematic review. This is more of a practical step by step guide than a theoretical piece. Hopefully it'll give you an idea about systematic reviews and help you to write your own.

Platelet Transfusion in Dengue

Management of dengue patients sometimes requires platelet transfusion, but an over-enthusiasm may be inappropriate. This article examines the available evidences regarding rational use of platelet transfusion in dengue.

Evidence Based Medicine

Evidence Based Medicine is the concept of treating patients based on solid evidence gathered from medical research. This is a brief article about its implications in our clinical practice.

Droplet Infection

Droplet infection is a major way of disease transmission. A number of infections can spread this way. Some basic things about droplet infections are described in this article.

Haiku for COVID-19

This is a collection of haiku telling the story of COVID-19. As the pandemic goes on more and more haiku will be added to the collection.

The Shield of the Nation

This is a poem dedicated to all the Indian frontline healthcare workers at this hour of crisis. I hope history remembers us.

Why did I take up writing

During the COVID-19 pandemic of 2020, I decided to take up writing. I was already in my late twenties and hadn't written any book before. In this post I explain my reasons for taking up writing all of a sudden.

COVID-19 Crisis of India: Book 1

COVID-19 pandemic ravaged the world in the early 2020. India was not spared either. I'm documenting the Indian side of the story from the perspective of a doctor in a book series called "COVID-19 Crisis of India: A Doctor's Perspective". This post is about the first book in the series.

Cryptococcal Meningitis

Cryptococcal meningitis is frequently seen in immunocompromised patients. This article describes the diagnosis and management of this condition in resource poor settings.

Immune Reconstitution Inflammatory Syndrome

Immune Reconstitution Inflammatory Syndrome is the worsening of some pre-existing illness due to improvement of immunity in an immunocompromised patient. This brief article primarily focuses on TB IRIS.

Acid Base Disorders

This article describes the acid base disorders in humans. It discusses the physiology behind the acid base balance, different disorders of acid base balance, their pathophysiology, diagnosis and treatments.

Fifteen basic knots

This article describes fifteen basic knots and how to tie them. The knots are selected according to their importance and the ease of learning them.

Gunshot injuries in Forensic Medicine

Discusson of gunshot injuries in Forensic Medicine is mainly concerened about the wounds produced by firearms on human bodies and the informations that can be derived by examining them.

A very short guide to ECG interpretation

This is a very short guide to ECG interpretation. This article focuses on quickly enabling you to read ECG strips in a step by step method.

File Sharing over Network

File sharing is one of the most necessary job in everyday life. But it becomes extremely easy and efficient if you have your computers connected with a Local Area Network. LAN sharing is faster than Internet sharing and more convenient than moving files physically.

Linux Filesystem

This blog article describes the most basic structure of Unix file system. In Linux everything is a file. All the folders and files are inherited from a single root. The storage devices are mounted to existing directories and accessed from there.

Creating a Website

This article describes the fundamental things you need to know about websites with schematic diagram of server-client model. It will serve as a practical guide to create a website on your own.

What does Hacking mean

The word hacking does not mean illegal access to other people’s information. But the real meaning of the word is knowing a system inside out, finding problems and solving them.

GPG Keys

GPG is an asymmetric encryption system that enables people to securely exchange data. GPG depends on a key pair. A message can be encrypted by public key and then it can only be decrypted by the corresponding private key.

GNU/Linux Adoption

Linux is a secure, customizable and easy to use OS that follows the Unix standards. This article describes why you should consider moving to Linux.

Chakravyuha and potential counter-measures

Chakravyuha is a troop formation mentioned in the Indian epic of Mahabharata. This article describes the formation and speculates about some potential counter-measures against it.

Copyright © 2012-2020 Dr. Agnibho Mondal
E-mail: mondal@agnibho.com