Tech Talk

Digital Transformation, Artificial Intelligence, Machine Learning, IoT, Big Data Analytics, Enterprise Architecture, Performance Engineering, Security, Design and Development tips on Java and .NET platforms.

Monday, January 22, 2024

Gaia-X & Catena-X: Data usage governance and Sovereignty

›
Unless you have been living under a rock, you must have heard about Gaia-X . The whole premise of Gaia-X was to build a fair and open data e...
Tuesday, December 05, 2023

Generating synthetic data

›
  Faker is an excellent tool for generating mock data for your application. But any complex application would have tens of tables with compl...
Sunday, November 05, 2023

Fine-tuning vs RAG for LLMs

›
Large language models (LLMs) have revolutionized the field of natural language processing (NLP), enabling state-of-the-art performance on a ...
Friday, November 03, 2023

Ruminating on Debezium CDC

›
Debezium is a distributed open source platform for change data capture (CDC). It collects real-time changes to database tables and transmits...
Wednesday, October 11, 2023

Mock data and APIs

›
Mocking APIs and synthetic mock data generation are invaluable techniques to speed up development. We recently used the Mockaroo platform an...

Leveraging Graph Databases for Fraud Detection

›
 There are many techniques for building Fraud Detection systems. It can be: Rule Based (tribal knowledge codified) Machine Learning (detect ...
Friday, October 06, 2023

Defensive measures for LLM prompts

›
To prevent abusive prompts and prompt hacking, we need to leverage certain techniques such as Filtering, Post-Prompting, random enclosures, ...
Sunday, September 10, 2023

Ruminating on Clickjacking

›
Clickjacking is a sort of cyberattack in which people are tricked into clicking on something they did not plan to click on. This can be acco...
Tuesday, August 15, 2023

Ruminating on Shadow Testing or Shadow Mirroring

›
Shadow testing is a software testing technique that involves sending production traffic to a duplicate or shadow environment. This allows te...
Monday, July 31, 2023

Ruminating on Differential Privacy

›
Differential privacy (DP) is a mathematical paradigm for protecting individuals' privacy in datasets. By allowing data to be analysed wi...
Thursday, July 20, 2023

Ruminating on nip.io and Let's Encrypt

›
nip.io is a free, open-source service that allows you to use wildcard DNS for any IP address. This implies you may build a hostname that re...
Monday, July 03, 2023

Ruminating on Observability

›
It is more critical than ever in today's complex and dispersed IT settings to have a complete grasp of how your systems are performing. ...
Saturday, May 13, 2023

Ruminating on Prompt Engineering

›
There has been a lot of buzz in recent years about the potential of large language models (LLMs) to develop new text forms, translate langua...
Monday, January 16, 2023

API mock servers from OpenAPI specs

›
 If you have an OpenAPI specs file (YAML or JSON), then you can quickly create a mock server using one of the following tools.  Microrocks: ...
Saturday, November 19, 2022

Ruminating on the internals of K8

›
Today Kubernetes has become the defacto standard to deploy applications. To understand what happens behind the scenes when you fire "ku...
Wednesday, September 07, 2022

Ruminating on Hypothesis testing

›
The following two articles by Rebecca Bevans are an excellent introduction to the concept of Hypothesis testing and the types of statistic...

Free Stats & Finance courses

›
The following site has an excellent collection of 20 free courses that I would highly recommend for folks who want to learn the basics of f...

Continuous, Discreet and Categorical variables

›
The following websites gives an excellent overview for beginners of the 3 different types of variables that we encounter in feature engineer...
Wednesday, August 31, 2022

Ruminating on TMForum

›
The TM Forum ( TMF ) is an organisation of over 850 telecom firms working together to drive digital innovation. They created a standard know...
Monday, August 29, 2022

mAP (mean Average Precision) and IoU (Intersection over Union) for Object Detection

›
mAP (mean Average Precision) is a common metric used for evaluating the accuracy of object detection models. The mAP computes a score by com...
Thursday, August 25, 2022

Ruminating on Bloom's Taxonomy

›
I was trying to help my kids understand the importance of deeply understanding a concept, instead of just remembering facts.  I found the kn...
Thursday, August 11, 2022

Handling Distributed Transactions in a microservices environment

›
 In a distributed microservices environment, we do not have complex 2-phase commit transaction managers.   We need a simpler approach and we...
Wednesday, August 10, 2022

API contract first design

›
 I have always been a great fan of the 'Contract-First' API design paradigm. The Swagger (OpenAPI) toolset makes it very simple to d...
Wednesday, July 20, 2022

Ruminating on Data Lakehouse

›
 In my previous blog posts, we had discussed about Data Lakes and Snowflake architecture .  Since Snowflake combines the abilities of a tra...
Saturday, June 11, 2022

ServiceNow Gekkobrain & Celonis for SAP S4 HANA modernization

›
One of the fundamental challenges in migrating SAP ECC to S/4 HANA is the lack of knowledge on the plethora of customizations done on legacy...
Wednesday, June 08, 2022

Ruminating on software defined cloud interconnect (SDCI)

›
When we connect on-prem applications to cloud services, we have two options - a) Connect to the cloud service provider through the internet ...
Wednesday, June 01, 2022

Ruminating on Data Gravity

›
Data Gravity is a concept that states that as more and more data gets accumulated (analogy of mass increasing), there would be greater attra...
Monday, May 30, 2022

Hash Length of SHA 265

›
It is important to note that any hash algorithm always returns a hash of fixed length.  SHA256 returns a hash value that is 256 bits - i.e. ...
Sunday, May 29, 2022

Does Bitcoin encrypt transactions?

›
 * It is important to note that the core bitcoin network/ledger does not use any encryption. It is all hashing as explained here -  https://...

Ruminating on Elliptic Curve Cryptography

›
When it comes to symmetric encryption, the most common standards are Data Encryption Standards (DES) and Advanced Encryption Standards (AES)...
‹
›
Home
View web version
Powered by Blogger.