Meet Adam Coholan, a Full Stack Software Engineering intern at Caseware IDEA

Hello, ciao, bonjour, and welcome to the first chapter of our Atypical Internship series! This article features Adam Coholan, a Niagara based intern working remotely for Ottawa-based company, Caseware IDEA.

A little bit about Adam

Hi! I’m Gerry and I’m the co-founder and CTO of Lumaki Labs. I’m a mechatronics engineer by degree and a software engineer by industry. As a Canadian, it is my obligation to thank you for taking a few minutes to read my work. Cheers!

Photo by ian dooley on Unsplash


I was scrolling through LinkedIn today and saw an interesting question posted by the fine people at Facebook. The question went like this:

Hi! I’m Gerry and I’m the co-founder and CTO of Lumaki Labs. I’m a mechatronics engineer by degree and a software engineer by industry. As a Canadian, it is my obligation to thank you for taking a few minutes to read my work. Cheers!

Photo by XPS on Unsplash

Whether it’s your first or sixth internship, the mixed feelings of nervousness and excitement with a little bit of anxiousness haven’t gone away.

These are natural feelings; you’re starting a new job at a new company with new people working on projects that are most likely new to you. …

Photo by Isabella Christina on Unsplash

TLDR: Here is a link to the table with the points to consider when planning a project timeline. NOTE: there are 2 extra points not discussed in this article in the table (Architecture Effort and Effort vs Calendar), I’m still learning more about those.

If you read the title, then maybe you’re like me and struggle with making half-decent time estimates for your project timelines. Or maybe you always make perfect predictions and are here to laugh at this article and problem I encounter quite often. Or maybe you make ok time estimates and wanna see how you can improve…

Image by Darwin Laganzon from Pixabay

In today’s day and age, security is the buzz of the tech world. Questions and concerns revolving around privacy and the safety of users personal information are always being brought up time and time again, with good reason. Users are frequently updating their personal information, their location, and more on a daily basis from their phones. This also includes banking statements and transactions, and where is it being stored? On clouds in secured networks of course! Without the proper security measures in place, anyone from anywhere in the world can access this information.

Intrusion Detection Systems (IDS) are the first…

It is known that Intrusion Detection Systems (IDS) are weak against adversarial attacks and research is being done to prove the ease of breaking these systems. Many have begun to recognize the flaws in machine learning, and consequently, a framework called Intrusion Detection System Generative Adversarial Network (IDSGAN) is proposed to create adversarial attacks, which can deceive and evade any IDS.

To understand more about IDSGANs and how feasible it is to break into an IDS system, let us take a look at a Generative Adversarial Network (GAN) which is a generic framework used to fool machine learning algorithms. GAN…

Have you ever wondered how your computer/network is able to avoid being infected with malware and bad traffic inputs from the internet? The reason why it can detect it so well is because there are systems in place to protect your valuable information held in your computer or networks. These systems that detect malicious traffic inputs are called Intrusion Detection Systems (IDS) and are trained on internet traffic record data. The most common data set is the NSL-KDD, and is the benchmark for modern-day internet traffic.

The NSL-KDD data set is not the first of its kind. The KDD cup…

Artificial intelligence (AI) has come a long way in a very short period of time. Alan Turing, a pioneer computer scientist, published the first paper on the possibility of machines that can think in 1950. In less than a century, humans have created machines and programs that can compute and comprehend very large amounts of data to learn and mimic the acts of humans themselves.

People, businesses, and governments rely heavily on this newfound technology without even realizing it. One growing sector of AI is security. Intrusion Detection Systems (IDS) are systems used to protect networks or systems from malicious…

Recently, neural networks have grabbed a lot of attention. They are a computing system of interconnected nodes and act similarly to how a brain functions. This system clusters large, raw data sets, and by finding patterns they can then solve very complex problems and classify inputs or even make difficult predictions. The most amazing part? They have the ability to never stop learning!

At the core of a neural network, the basic building block of one, is a perceptron. Perceptrons are necessary because they break down complex inputs into smaller, simpler pieces. If you were to take a picture of…

A neural network is an interconnected system of perceptrons, so it is safe to say perceptrons are the foundation of any neural network. Perceptrons can be viewed as building blocks in a single layer in a neural network, made up of four different parts:

  1. Input Values or One Input Layer
  2. Weights and Bias
  3. Net sum
  4. Activation function

A neural network, which is made up of perceptrons, can be perceived as a complex logical statement (neural network) made up of very simple logical statements (perceptrons); of “AND” and “OR” statements. A statement can only be true or false, but never both…

Gerry Saporito

Not the best writer but I write anyways.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store