<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Peter Ngotho</title>
    <description>The latest articles on DEV Community by Peter Ngotho (@peterngotho).</description>
    <link>https://dev.to/peterngotho</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2441640%2Ff7229e28-20dd-4623-9909-92be0dbe59c5.jpg</url>
      <title>DEV Community: Peter Ngotho</title>
      <link>https://dev.to/peterngotho</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/peterngotho"/>
    <language>en</language>
    <item>
      <title>AI actually isn’t moving that fast.</title>
      <dc:creator>Peter Ngotho</dc:creator>
      <pubDate>Tue, 14 Apr 2026 05:43:40 +0000</pubDate>
      <link>https://dev.to/peterngotho/ai-actually-isnt-moving-that-fast-1p48</link>
      <guid>https://dev.to/peterngotho/ai-actually-isnt-moving-that-fast-1p48</guid>
      <description>&lt;p&gt;It just feels like it is because you’re watching the surface layer.&lt;/p&gt;

&lt;p&gt;It’s not Claude vs ChatGPT.&lt;br&gt;
It’s whether your product creates real business value.&lt;/p&gt;

&lt;p&gt;It’s not OpenClaw vs Claude Cowork.&lt;br&gt;
It’s whether AI can actually take actions on behalf of users.&lt;/p&gt;

&lt;p&gt;It’s not vector databases vs Postgres.&lt;br&gt;
It’s whether your system gets the right context at the right time.&lt;/p&gt;

&lt;p&gt;It’s not which model is “best.”&lt;br&gt;
It’s whether the model is embedded into a workflow people already use.&lt;/p&gt;

&lt;p&gt;The biggest mistake people are making right now: Optimizing for demos instead of outcomes.&lt;/p&gt;

&lt;p&gt;We’ve had:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Impressive copilots that no one opens twice&lt;/li&gt;
&lt;li&gt;Agents that work until they hit real-world edge cases&lt;/li&gt;
&lt;li&gt;Dashboards powered by AI that don’t change decisions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Claude isn't killing anything unless we actually trust it to!&lt;/p&gt;

</description>
      <category>agents</category>
      <category>ai</category>
      <category>discuss</category>
      <category>product</category>
    </item>
    <item>
      <title>The Evolution of Cybersecurity in the Age of AI</title>
      <dc:creator>Peter Ngotho</dc:creator>
      <pubDate>Sat, 16 Nov 2024 12:29:33 +0000</pubDate>
      <link>https://dev.to/peterngotho/the-evolution-of-cybersecurity-in-the-age-of-ai-1be6</link>
      <guid>https://dev.to/peterngotho/the-evolution-of-cybersecurity-in-the-age-of-ai-1be6</guid>
      <description>&lt;p&gt;**_AI and machine learning (ML) are now at the forefront of cybersecurity, enabling companies to detect and respond to threats in real-time.As technology advances, so too does the sophistication of cyberattacks. In the past, traditional cybersecurity focused on perimeter defense, using firewalls and antivirus software to protect against external threats. AI and machine learning (ML) have become crucial in detecting and responding to cyber threats. AI systems are capable of processing vast amounts of data at lightning speeds, enabling them to identify unusual patterns and behaviors that might indicate a cyberattack.&lt;/p&gt;

&lt;p&gt;Role of AI in Cybersecurity&lt;/p&gt;

&lt;p&gt;Threat Detection: AI algorithms analyze vast amounts of data to identify patterns and anomalies that may indicate a security breach. By continuously learning from new data, these systems can improve their accuracy over time, allowing for quicker detection of potential threats.&lt;br&gt;
Automated Response: In addition to identifying threats, AI can automate responses to certain types of attacks. For example, if a system detects unusual login attempts, it can automatically lock accounts or alert administrators, reducing the response time significantly.&lt;br&gt;
Predictive Analytics: AI-powered tools can predict potential vulnerabilities by analyzing historical data and current trends. This proactive approach helps organizations strengthen their defenses before an attack occurs.&lt;br&gt;
Enhanced Security Protocols: With the integration of AI, security protocols can be dynamically adjusted based on real-time analysis of network traffic and user behavior. This adaptability ensures that security measures remain effective against evolving threats. Companies like Hexadecimal Softwares are leveraging AI to enhance cybersecurity by developing intelligent systems that can predict, prevent, and respond to cyber threats in real time. With a deep focus on integrating AI-driven security frameworks, Hexadecimal Softwares offers businesses tailored solutions that stay ahead of emerging threats. In conclusion,the future of cybersecurity is deeply intertwined with AI, offering new capabilities while posing new challenges. As the digital landscape continues to evolve and are leading the charge in integrating advanced AI technologies to safeguard businesses from the ever-growing risk of cyber threats._**&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is Pickle in python ?</title>
      <dc:creator>Peter Ngotho</dc:creator>
      <pubDate>Sat, 16 Nov 2024 12:27:53 +0000</pubDate>
      <link>https://dev.to/peterngotho/what-is-pickle-in-python--5f8h</link>
      <guid>https://dev.to/peterngotho/what-is-pickle-in-python--5f8h</guid>
      <description>&lt;p&gt;It is used for serializing and de-serializing a Python object structure.&lt;br&gt;
Pickling: It is a process where a Python object hierarchy is converted into a byte stream and dumps it into a file by using dump function.This character stream contains all the information necessary to reconstruct the object in another python script.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unpickling&lt;/strong&gt;: It is the inverse of Pickling process where a byte stream is converted into an object hierarchy.While the process of retrieving original Python objects from the stored string representation is called unpickling.we use load function to do this.&lt;br&gt;
First of all you have to import pickle module through this command:&lt;/p&gt;

&lt;p&gt;import pickle&lt;br&gt;
Pickle has two main methods. The first one is dump, which dumps an object to a file object and the second one is load, which loads an object from a file object.&lt;/p&gt;

&lt;p&gt;Examples&lt;br&gt;
1). Pickling.&lt;br&gt;
import pickle&lt;/p&gt;

&lt;p&gt;a=[1, 2, 3, 4, 5, 6, 7]&lt;/p&gt;

&lt;h1&gt;
  
  
  open the file for writing
&lt;/h1&gt;

&lt;p&gt;pic_out=open("mypicklefile","wb")&lt;/p&gt;

&lt;h1&gt;
  
  
  write object to file mypicklefile
&lt;/h1&gt;

&lt;p&gt;pickle.dump(a,pic_out)&lt;/p&gt;

&lt;p&gt;pic_out.close()&lt;br&gt;
2). Unpickling.&lt;br&gt;
import pickle&lt;/p&gt;

&lt;h1&gt;
  
  
  open the file for reading
&lt;/h1&gt;

&lt;p&gt;pic_in = open("mypicklefile", "rb")&lt;/p&gt;

&lt;h1&gt;
  
  
  load the object from the file into var a
&lt;/h1&gt;

&lt;p&gt;a = pickle.load(pic_in)&lt;/p&gt;

&lt;p&gt;print(a)&lt;br&gt;
Output:[1, 2, 3, 4, 5, 6, 7]&lt;br&gt;
Use cases of Pickling:&lt;/p&gt;

&lt;p&gt;saving a program’s state data to disk so that it can carry on where it left off when restarted (persistence)&lt;br&gt;
sending python data over a TCP connection in a multi-core or distributed system (marshalling)&lt;br&gt;
storing python objects in a database&lt;br&gt;
converting an arbitrary python object to a string so that it can be used as a dictionary key (e.g. for &lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
