Privacy is important even if you have nothing to hide. Just like the freedom of speech, right to privacy is intertwined with freedom and democracy.
Signal is the most secure messaging app available at this moment. It has the benefit of being open source, non-monetized and truly end-to-end encrypted along with the state of the art protection of meta-data.
Patients with COVID-19 may experience arterial hypoxemia without any sensation of respiratory distress. Although poorly understood, various hypotheses have been proposed to explain this phenomenon.
I am an atheist and I have a strong conviction about this. In this post I explain why I refuse to believe in the existence of any god.
Despite being a die-hard supporter of libre softwares, sometimes it is necessary to run Microsoft Office to maintain compatibility with other people. Here are some ways we can do that without sacrificing the power and freedom of GNU/Linux
National freedom means nothing if the individuals are not free. An authoriatraian government is hardly any better than foreign rule.
Medical research often involves testing of null hypothesis in order to determine the significance of the findings. Two types of errors may occur in this method, type 1 error and type 2 error.
Many studies report significance of study findings in terms of p-value and confidence interval. This article describes in short what these terms mean.
This article describes how to do a systematic review. This is more of a practical step by step guide than a theoretical piece. Hopefully it'll give you an idea about systematic reviews and help you to write your own.
Management of dengue patients sometimes requires platelet transfusion, but an over-enthusiasm may be inappropriate. This article examines the available evidences regarding rational use of platelet transfusion in dengue.
Evidence Based Medicine is the concept of treating patients based on solid evidence gathered from medical research. This is a brief article about its implications in our clinical practice.
Droplet infection is a major way of disease transmission. A number of infections can spread this way. Some basic things about droplet infections are described in this article.
This is a poem dedicated to all the Indian frontline healthcare workers at this hour of crisis. I hope history remembers us.
Cryptococcal meningitis is frequently seen in immunocompromised patients. This article describes the diagnosis and management of this condition in resource poor settings.
Immune Reconstitution Inflammatory Syndrome is the worsening of some pre-existing illness due to improvement of immunity in an immunocompromised patient. This brief article primarily focuses on TB IRIS.
This article describes the acid base disorders in humans. It discusses the physiology behind the acid base balance, different disorders of acid base balance, their pathophysiology, diagnosis and treatments.
This article describes fifteen basic knots and how to tie them. The knots are selected according to their importance and the ease of learning them.
Discusson of gunshot injuries in Forensic Medicine is mainly concerened about the wounds produced by firearms on human bodies and the informations that can be derived by examining them.
This is a very short guide to ECG interpretation. This article focuses on quickly enabling you to read ECG strips in a step by step method.
File sharing is one of the most necessary job in everyday life. But it becomes extremely easy and efficient if you have your computers connected with a Local Area Network. LAN sharing is faster than Internet sharing and more convenient than moving files physically.
This blog article describes the most basic structure of Unix file system. In Linux everything is a file. All the folders and files are inherited from a single root. The storage devices are mounted to existing directories and accessed from there.
This article describes the fundamental things you need to know about websites with schematic diagram of server-client model. It will serve as a practical guide to create a website on your own.
The word hacking does not mean illegal access to other people’s information. But the real meaning of the word is knowing a system inside out, finding problems and solving them.
GPG is an asymmetric encryption system that enables people to securely exchange data. GPG depends on a key pair. A message can be encrypted by public key and then it can only be decrypted by the corresponding private key.
Linux is a secure, customizable and easy to use OS that follows the Unix standards. This article describes why you should consider moving to Linux.
Chakravyuha is a troop formation mentioned in the Indian epic of Mahabharata. This article describes the formation and speculates about some potential counter-measures against it.