Articles

Choosing the right techniques for your AI/ML experiments

Early this morning, I was sitting on the balcony, thinking about choosing the topic for today. The atmosphere was very pleasant, trees were swaying with the cool breeze, and birds were chirping and jumping around. Suddenly I noticed a light-colored butterfly flying around swiftly from place to place. I don’t know what it was looking for, but it continued...

The evolution of data in the insurance industry

The insurance industry has always relied on historical data to assess potential risks. With the advent of digital technologies, the industry has a lot more touch points with the customer and processes that can be tapped into to gather a lot of data. Along with historical data, the insurers also have access to a huge amount of real-time data. Both...

Using transactions in entity framework core

A database transaction is a sequence of multiple operations performed on a database, and all served as a single logical unit of work. If the transaction is committed, all of the operations are successfully committed to the database. If the transaction is rolled back, none of the operations are committed to the database. In Entity Framework, the SaveChanges() method is...

You’re missing out on something

It was a very busy evening at the beach. After the day's work, I was relaxed and decided to spend some time watching the buzz around. A few kids were busy building a sand castle. They were so engrossed and bothered little about what was going around. A few other kids were playing football on the sands, focusing on...

Considerations for using JWT tokens- Part 2

To cater to this challenge create a blacklist or whitelist the tokens - a stateful JWT token can be implemented. But that again introduces server-side storage. This is nearing the implementation of the Session itself with added payloads as the size of JTW tokens is usually larger than the session Ids. JWTs being more sophisticated, the attack vectors that can be...

Machines learning with focus

On the first day in the office at my first job, I reached much before others. Banu, manning the reception, was the only person around. She asked me to wait in the reception area. After a short while, other employees started arriving. I was observing how they were entering the office, how they were dressed, how they were noticing and...

Creating a robust infrastructure to utilize data streams

It is raining heavily in my city. It reminds me of the data that is produced or recorded by even a moderately sized organization. Numerous data streams are flooding the business every day. In order to harness this force, the business has to judiciously create the data lakes and dam the data without harming the business environment, using the...

Considerations for using JWT tokens- Part 1

In the last post, we did mention that JWT tokens are gaining popularity these days. It's the latest technology and is widely adopted by many well-known platforms. Having said that JWT, being a very recent technology also has its cons that need to be considered when taking the decision of using JWT tokens for Authentication. JWT Tokens are offered compared...

What is Intelligence?

If intelligence is your ability to make decisions based on available information, then it should be the easiest task for computers. There is no lack of information, or data as we say it, and no lack of processing power either. Then what makes it so difficult for the computer to develop intelligence? The basic problem is that the term intelligence...

Machine Learning with Graphs

Complex domains have a rich relational structure which can be represented as a relational graph consisting of entities and relationships. Graphs are a language built on graph data structures to describe and analyze entities with relations/interactions. Many types of data are graphs. Social networks Communication networks Internet Knowledge Graphs Research paper citation networks Molecules And many more. We can take advantage...