Ciências da Computação e da InformaçãoInglêsHugo

Abhishek Tiwari

Abhishek Tiwari
Diary of a Tech Savant and Servant Leader - All things technology, product, and engineering leadership.
Pagina inicialFeed Atom
language
ResearchPrivacy-engineeringDifferential-privacyPetsPptsCiências da Computação e da InformaçãoInglês
Publicados

Differential Privacy (DP) is a mathematical framework that protects individual privacy in data analysis while allowing useful insights to be extracted. It works by adding carefully calibrated noise to data or query results, ensuring that including or excluding any single individual’s data doesn’t significantly change the analysis outcomes.

ResearchDifferential-privacyPrivacy-engineeringCiências da Computação e da InformaçãoInglês
Publicados

A mathematical guarantee is a formal, provable assurance about the behavior, performance, or properties of a system, algorithm, or process, derived from rigorous mathematical analysis or proof. The guarantee is based on mathematical logic and can be demonstrated through mathematical reasoning. It provides a definitive statement about what can be expected under specified conditions.

ManagementEngineering-excellenceEngineeringCiências da Computação e da InformaçãoInglês
Publicados

We’ve all experienced the frustration of our smartphones crashing or freezing at the worst possible moment. So how is it that NASA can land a rover on Mars, millions of miles away, with software that works flawlessly? The answer lies in a combination of factors that set space-grade software apart from your average app. Let’s dive deep into the world of aerospace software engineering and uncover the secrets behind NASA’s incredible reliability.

ManagementEngineering-excellenceCiências da Computação e da InformaçãoInglês
Publicados

Recently I have been reading Art of Leadership, The: Small Things, Done Well by Michael Lopp. This book is an excellent read and it covers small things that you can do to build trust and to become an authentic and true leader to your team at different stages of your leadership journey.

ResearchSearch-engineeringCiências da Computação e da InformaçãoInglês
Publicados

Anyone who has worked with advanced search systems knows the intricacy of boolean operators. AND, OR, NOT - these seemingly simple words become powerful tools in the hands of search specialists. Add in proximity operators like WITH and NEAR, throw in some parentheses for nesting, and you’ve got yourself a query that can pinpoint exactly what you’re looking for… or so we thought. In practice, these queries can become unwieldy beasts.

ResearchMachine-learningLarge-language-modelsCiências da Computação e da InformaçãoInglês
Publicados

When a machine learning model is trained on a dataset, not all data points contribute equally to the model’s performance. Some are more valuable and influential than others. Unfortunately value of data for training purposes is often nebulous and difficult to quantify. Applying data valuation to large language models (LLMs) like GPT-3, Claude 3, Llama 3.1 and their vast training datasets has faced significant scalability challenges to date.

ResearchPrivacy-engineeringGraph-theoryCiências da Computação e da InformaçãoInglês
Publicados

Personal data processing forms the backbone of many big tech service providers. Tech giants like Netflix, Meta, and Amazon employ intricate networks of microservices to automatically process user data, creating complex data flows that span multiple layers of computation.

ManagementStrategyCiências da Computação e da InformaçãoInglês
Publicados

Having a well-defined strategy is crucial for success of a modern business. A good strategy should address the core problems or challenges faced by a business, provide guiding principles on how to tackle them, and be supported by the coherent actions and right resources. In this article, we will explore the core elements of a good strategy.

ResearchDevsecopsInfrastructure-as-codeDevopsSecurityCiências da Computação e da InformaçãoInglês
Publicados

The ability to deploy applications quickly and efficiently is crucial for organizations. Agile methodologies and continuous integration/continuous deployment (CI/CD) pipelines have become the norm, enabling rapid release cycles and frequent updates. However, amidst the drive for speed, ensuring policy compliance is often overlooked, leading to potential security vulnerabilities and compliance risks.

Best-practicesDevopsMonitoringTestingCiências da Computação e da InformaçãoInglês
Publicados

In digital landscape user experience is paramount and organisations must ensure their applications and systems are functioning optimally at all times. Traditional testing and monitoring practices have long been relied upon to achieve this goal. However, the line between testing and monitoring is becoming increasingly blurred with the emergence of synthetic monitoring.