Gowhar Reshi

I am distinguished Engineer and cybersecurity graduate from UC Berkeley specializing in AI and hyperscale infrastructure across networking, cloud, and security.

The Evolution of Cryptography in Securing Information! From War Rooms to Algorithms

Cryptography has evolved from simple substitution techniques used in ancient warfare to mathematically rigorous systems securing modern digital communication. This article traces the historical progression of cryptographic methods, examining how shifting threats from military espionage to global cyber risks have shaped increasingly sophisticated encryption systems. It argues that the evolution of cryptography reflects a continuous […]

The Evolution of Cryptography in Securing Information! From War Rooms to Algorithms Read More »

Designing Next-Generation AI Infrastructure: Balancing Compute, Network, Memory, and Scale

The rapid advancement of artificial intelligence (AI), particularly large-scale foundation models, is redefining the design of modern computing infrastructure. Traditional data center architectures, optimized for CPU-centric workloads, are increasingly inadequate for distributed AI systems. This article examines the interplay between accelerated compute, high-performance networking, and memory systems, and argues that the next frontier of AI

Designing Next-Generation AI Infrastructure: Balancing Compute, Network, Memory, and Scale Read More »

The Future of Cryptography: Why Hybrid Encryption Will Define the Post-Quantum Era

Modern cryptography stands at a pivotal moment. For decades, the security of digital systems has relied on a carefully balanced partnership between symmetric encryption (such as Advanced Encryption Standard) and asymmetric encryption (including RSA and Elliptic Curve Cryptography). While symmetric algorithms provide high-speed data encryption, asymmetric techniques enable secure key exchange and authentication. Together, they

The Future of Cryptography: Why Hybrid Encryption Will Define the Post-Quantum Era Read More »

Zero Trust at Scale: What Works—and What Fails—in Large Enterprise Networks

Abstract Zero Trust is widely adopted as a modern security strategy, yet many large enterprises struggle to achieve outcomes beyond tool deployment and compliance alignment. At scale, Zero Trust is not a product category—it is an operating model built on identity-driven access, enforceable policy, segmentation aligned to business flows, and continuous validation through telemetry. This

Zero Trust at Scale: What Works—and What Fails—in Large Enterprise Networks Read More »