Articles

Considerations for using JWT tokens- Part 1

In the last post, we did mention that JWT tokens are gaining popularity these days. It's the latest technology and is widely adopted by many well-known platforms. Having said that JWT, being a very recent technology also has its cons that need to be considered when taking the decision of using JWT tokens for Authentication. JWT Tokens are offered compared...

What is Intelligence?

If intelligence is your ability to make decisions based on available information, then it should be the easiest task for computers. There is no lack of information, or data as we say it, and no lack of processing power either. Then what makes it so difficult for the computer to develop intelligence? The basic problem is that the term intelligence...

Machine Learning with Graphs

Complex domains have a rich relational structure which can be represented as a relational graph consisting of entities and relationships. Graphs are a language built on graph data structures to describe and analyze entities with relations/interactions. Many types of data are graphs. Social networks Communication networks Internet Knowledge Graphs Research paper citation networks Molecules And many more. We can take advantage...

Human Learning and AI

It was my first month in the new job. I was working with a new prospect and visited them multiple times to finalize the proposal for their requirements. It may sound a bit strange now, but in those days we used to meet in person for discussions. Phones were used only to get appointments. It was becoming a routine...

Organizations: how to deliver a customer centric approach

The current business climate is changing very fast due the global exposure and technological advances. The organizations that are embracing technological advances are thriving in these times. On the other hand, customers have become savvier and are expecting a lot. How can the organizations deliver the customer-centric approach? They can do so, by anticipating what the customers want, and when they...

Token based authentication

In the modern digital era, the way web applications are designed and developed has come a long way compared to traditional web applications. Accessing applications or resources is no more limited to computers. Rather mobile devices are being used widely to access websites and resources.  The resources are not necessarily private in nature - and modern-day applications even extend...

How to evaluate a successor for your business

“Hmm. I had never thought about succession planning earlier. Now that you have initiated the discussions it has been high on my mind throughout the last week.” Yash was the one to get on to the topic real quick. “I am planning to be at this business conference in Europe for a couple of weeks. I was wondering how to...

Bridging the gap between data science and business

In my last post, I talked about the two criteria to benefit from Data Science. The first is to identify well-defined problems that can be solved by AIML, second is to get buy-in from stakeholders. Businesses can drive immense benefit from defining the strategy based on the data insights provided by the business leaders and the data scientists work hand...

Service discovery in microservices

Loosely coupled independent components are the essence of microservices architecture. The design principles aim at small services developed by independent teams using different technologies. The services can be scaled up and down irrespective of the other services. Although the services are independent, they are built as a solution which means there is a heavy need for interaction among the...

Best practices for getting the most out of AIML solutions in business

AIML can increase business productivity and effectiveness in multiple ways. I have mentioned some of them in my previous posts. The business should follow some best practices to get the maximum benefit from AIML solutions. First and foremost is selecting the right problem to solve using AIML.  There could be a temptation to look at popular use cases and expect the...