- BUCC SyncUp
- Posts
- BUCC SyncUp - November 2025
BUCC SyncUp - November 2025

BUCC Highlights
Bit by Qubit: Your Gateway to Quantum Computing
Ever wondered what happens when 0 and 1 can exist at the same time? Welcome to the mind-bending world of Quantum Computing, where classical logic takes a quantum leap!The BRAC University Computer Club (BUCC) proudly presents the first episode of our brand-new workshop series, “BUCC ProLabs”, exclusively crafted for BUCC members. Don’t just use computers, understand what comes next. Join us to explore how qubits, entanglement, and quantum logic are redefining the very foundation of computation.
Secure your spot now! Registration Link : https://forms.gle/Ah9FVr27HuC1cX5r5

What is Quantum Computing ?
Quantum computing is an advanced form of computation that harnesses the principles of quantum physics to process information in a radically different way. Unlike classical computers that use bits (0s and 1s), quantum computers use qubits, which can represent both 0 and 1 at the same time through a property called superposition. Combined with entanglement, where qubits become interconnected and influence each other instantly, this allows quantum computers to perform complex calculations much faster and more efficiently. From cryptography and drug discovery to artificial intelligence and optimization problems, quantum computing holds the potential to revolutionize the way we solve problems that are currently beyond the reach of traditional computers.
Workshop on Software Quality Assurance Career

The BRAC University Computer Club (BUCC) organized an insightful “Workshop on Software Quality Assurance Career” on October 26, 2025, at the university’s Lecture Theatre. The session began with a warm introduction by Rizwanul Mushfiq. Following that, Mr. Ehsanul Alam Sabbir (SQA Engineer, VIVASOFT LTD) delivered an engaging presentation on the fundamentals of Software Quality Assurance (SQA) and its significance within the Software Development Life Cycle (SDLC).Then, Mr. Forhad Hossain and Mr. MD Ebrahim Hossain from Global Tech Assure elaborated on the growing global demand for SQA professionals, comparing salary structures and emphasizing the skills required for both local and remote job markets. Additionally, Ms. Syeda Sumiha Jahan (SQA Engineer, Streams Tech Ltd) highlighted the importance of building strong CVs and professional LinkedIn profiles while sharing inspiring success stories of alumni. Furthermore, Mr. Rubayat Ahmed Khan (Senior Lecturer, BRAC University) encouraged students to utilize online resources like YouTube to guide their learning journeys. Finally, Mr. Md Abdur Rahman (Augmedix Bangladesh Ltd) shared practical experiences from the testing field, after which an interactive quiz and Q&A session brought the event to an engaging close. To conclude, a token of appreciation was presented to the speakers, and a group photo was taken to capture the success of the workshop.
Thought Unplugged

Alan Turing: The Man Who Taught Machines to Think
Before the world ran on digital circuits or conversed with AI, one man was already teaching machines to reason. Alan Turing (1912–1954), born in London, England, saw computation not just as calculation, but as the spark of intelligence itself. While others worked with numbers and codes, Turing imagined the logic of thought and taught machines how to follow it.
He gave us the Turing Machine, the invisible framework that powers modern computing. He cracked codes that had kept nations in the dark, helping turn the tide of World War II. His visions stretched past the boundaries of his century: artificial intelligence, machine learning, and the very philosophy of what it means for a machine to “think.” Yet, like a cipher, his genius was often misunderstood and unrecognized in his own time. More than groundbreaking theories, countless papers, and one enduring truth: the future calculates with Turing’s imagination.Turing was a master of abstract thought and logic, capable of visualizing complex algorithms entirely in his mind before ever writing a line of code. He could see patterns and possibilities where others saw chaos, and his work laid the foundation for everything from modern computers to AI.
There’s something eternal about him, a reminder that true innovation isn’t born from recognition but from curiosity. Turing didn’t just invent; he imagined boldly enough for the rest of us to catch up. And even today, as computers hum quietly in every home, server, and device, they are still carrying a trace of his vision.
Tech Riddles
Afrin Anowar Tanisha
Executive, Press Release and Publications

1.ㅤI’m the bouncer at the network gate, rules in hand to decide your fate. Bad packets stopped, good ones pass , I guard the boundary like a glass.
2.ㅤI turn names into numbers so packets roam, without my book the web won’t find home. I point your browser where to go, I’m the internet’s little map and show.
3.ㅤI keep every edit, branch, and merge; I let teams work without the purge. Rewind, compare, or fix a quirk, I’m the history for your work.
4.ㅤI rewrite your thoughts to metal words, I prune and polish until it’s heard. From human script to machine command, I shape raw logic with a careful hand.
Tech Talk & Bytes

AI Has Entered the Chat, But Can We Still Trust the Humans? G M Jubayer Zaman Senior Executive, Press Release and Publications ![]() It’s 2025, and artificial intelligence is no longer a futuristic guest, it’s the main character. From writing emails to diagnosing diseases, AI is everywhere. But here’s the twist: while machines are becoming more human, humans are starting to act a little more like machines. Think about it. We now ask ChatGPT for opinions, let algorithms choose our playlists, and even let AI help us decide what to eat. It’s smart, it’s fast, it’s efficient, but are we losing something in the process? A study by MIT this year found that people using generative AI at work finished tasks 37% faster, but their ideas were rated 20% less original. That’s the trade-off: we gain speed, but risk creativity. AI gives us answers, but creativity often lives in questions. At the same time, “AI burnout” is becoming real. When every conversation, image, and post feels AI-touched, people crave authenticity, a real face, a real thought, a real voice. That’s why human-authored newsletters, small creators, and communities (like university clubs, robotics teams, or readers’ collectives) are quietly becoming the new digital rebellion. Ironically, the more AI evolves, the more valuable human taste becomes. Anyone can generate content, but not everyone can curate meaning. Your quirks, intuition, and emotional judgment suddenly become the rarest commodities in a world of synthetic perfection.We’re also starting to see AI influence human behavior. People spend hours tweaking prompts, chasing perfect results, or comparing AI outputs. In a strange twist, humans are training themselves to think like machines. Yet, it’s precisely our irrationality, curiosity, and empathy that machines can never truly replicate. So, what’s next? Human-AI teamwork, not rivalry. The future isn’t AI replacing us; it’s AI amplifying what makes us unique.Authenticity will trend. Whether it’s art, writing, or robotics, people will follow creators who feel real, not polished by an algorithm.Ethical creativity. The next frontier won’t be who can build the smartest model, but who can use it responsibly, meaningfully, and beautifully. Here’s the challenge: next time you ask an AI for help, ask yourself, is this an answer, or just noise? Because in a world full of synthetic intelligence, staying human might just be the smartest thing we can do. And maybe, just maybe, that’s where the next spark of genius will come from, imperfections, intuition, and heart. 4 in one-worth it or not? Wasifa Afsara Executive, Press Release and Publications An alarm clock that wakes you with a sunrise simulation, and a Bluetooth with wireless charging? The list does not end here; the bright shades will also give your room a cozy vibe. All four features in one device definitely sound like a great deal, but this is where the real question lies: Is it really worth it considering the amount you are paying? ![]() The G63 is a multifunctional bedside device that combines a Bluetooth speaker, RGB ambiance lighting, and an alarm clock. As fascinating as it sounds, it is not that exciting in the long run. To begin with, the sound quality is not satisfying, and the complex alarm settings are not that user-friendly. On the other hand, the wireless charging is also unreliable at times and supports the Qi wireless charging standard only. In addition to all these, the battery also drains very quickly. If you have continued so far and are feeling disappointed, you might be cheered to know that some larger and more expensive versions offer better features. However, the common version actually worked for me, considering the price. Apart from the basic features, G63 also comes with other pros like portability, aesthetic appeal, and all-in-one convenience. In my opinion, we often overthink before buying such products for ourselves, but if you know someone who is a tech lover, then you can surely opt for this device, as it will be a unique gift, that too within budget. Although if you are looking for a reliable and fast wireless charging option with premium sound quality, then the G63 is definitely not the device you are looking for. | The Screen Paradox Anika Salsabil Senior Executive, Press Release and Publications (1) In the Shadows of the Screen For a student in Computer Science, screens are not just tools; they are an extension of themselves. From typing assignments, coding, debugging, research, self-study from online lectures, or even communicating with the teachers and peers all via devices, every part of a CSE student’s academic life revolves around a monitor. Even without counting entertainment, our learning, productivity, and connection all depend on screen time. CSE students inevitably spend more time in front of a monitor than almost any other student demographic. It is not just mindless scrolling; it is intense cognitive focus on the tasks, and coding demanding hours and hours of undivided and uninterrupted attention. So, the question is, what is the ultimate cost of this inescapable screen time on their health, focus, and overall well-being? In this world of technology, we celebrate the educational benefits; having all these resources just one screen away is a dream come true. While this prosperity in Computer science should and must be celebrated, the toll taken by the Computer science masters in order to stand here should be recognised too; their well-being must be cared for as well. Surely, when the level of screen time required for the academic work crosses a threshold, the benefits start to clash with fundamental human needs for rest, movement, and both physical and mental health of these students. This series will focus on the tradeoff, the price CSE students and graduates pay in the pursuit of innovation, and explore how we can balance this without moving away from the monitor screens that define our very field. To Be Continued… ![]() Goodbye Passwords: How Passkeys Work Sayed Sohanul Islam Senior Executive, Press Release and Publications Passwords were never all that secure. They get reused, phishers snag them, and breached databases turn long strings of numbers into public knowledge. Enter the era of passkeys. Instead of relying on something you know (such as a password), they could instead use something you have (your phone, laptop or security key) plus something you are (biometrics). And everything is protected by the latest generation cryptography. Its central idea is straightforward. When you open an account with a pass key, there is a set of keys generated. One is called the public (which goes in all communication between you and the site) or private (kept safely on your device or security key) except during login. At the site's log-in page, a challenge comes your way. It is digitally signed by your device's private key--after you've unlocked the device locally with your fingerprint, biometric recognition or PIN. The site checks that signature against your public key and lets you in. ![]() That architecture conceals known attacks. Phishing will no longer work: you can't get the signature off a forged site. Credential stuffing ceases to exist since there isn't any password involved. And, even if a database disaster hits the news, all that leak shows is a public key--which by design is perfectly harmless. Passkeys are also practical. They synchronize across your ecosystem via cloud backups with end-to-end encryption (e.g., your phone and laptop). For travel or high-value accounts, you can add a hardware security key. If a public device is used by many people, make it mandatory for nothing to be left behind. Will passwords disappear soon? Not overnight. But even as many of these older systems carry on, the wind is blowing in a definite direction. Passkeys are already supported by current mainstream platforms and browsers. Switching for the majority is easy: turn on passkeys in whatever your password manager or account settings are called, sign up your device and add a backup hardware key. Shorter logins, fewer attacks, stronger security--such is the thing worth doing. |
Dijkstra’s Algorithm: Was the King Finally Dethroned?
Nishat Tasnim Zannat
Senior Executive, Event Management
Recently a post was circulating in my feed and was being shared by many people around me. This news caught my attention because I was doing my algorithms course in that semester. The news was- ‘’ Dijkstra’s algorithm - known for finding the shortest path in a directed weighted graph was defeated by a research team from Tsinghua University ‘’. So, how did they do it? I did a little research. But first let me tell you what Dijkstra’s algorithm is in simple words: Djikstra’s algorithm is an algorithm to find out a path, not necessarily the fastest but the shortest one in a directed weighted graph where the path cost is non-negative. First it picks the cheapest path. Check all its neighbors to see if there’s a cheaper path through it. if so, update their costs. repeat until this is done for every node in the graph, calculate the final path. Apps like Google Maps, routing systems, and game AI use this algorithm every second.
Time complexity: O(m + n log n), here- m = number of edges, n = number of nodes. That log n term comes from using a priority queue, where each insert or extract-min operation costs about log n time because it has to keep the queue sorted.

What the new research did:
In April 2025, the Tsinghua University team designed a new deterministic algorithm for directed graphs that still finds all shortest paths but reduces that sorting cost.They achieved a running time of: O(m log^(2/3) n). That means instead of log n per operation, they effectively pay only log^(2/3) n, which is asymptotically faster. In large graphs, this gives a measurable speedup, theoretically breaking the barrier once thought unbeatable.
In simple words, They replaced the fully ordered priority queue with a more structured grouping system that doesn’t need total sorting at every step. It estimates which edges can be safely processed next using partial ordering, so fewer comparisons are needed. And as a result the algorithm still finds exact shortest paths but spends less time “organizing” its data.
So, the improvement isn’t that Dijkstra suddenly became wrong, it’s that someone finally found a way to do the same job with less sorting work, shaving that long term down. It’s a breakthrough in theoretical speed, not a replacement yet for your typical Dijkstra implementation in real software.
Answers of Tech Riddles
1.Firewallㅤ 2.DNS (Domain Name System)ㅤ 3.Version control (Git)ㅤㅤ 4.Compiler
CONTRIBUTORS
Executive Bodies MD. Tahmid Iqbal Director, Press Release and Publications Pritom Mondal Director, Creative | Senior Executive G M Jubayer Zaman Press Release and Publications |



