Quick Outline for Designing Data Pipelines for Machine Learning Projects

As a Machine Learning Engineer, designing a data pipeline involves ensuring data flow is efficient, scalable, reliable, and optimized for the requirements of ML models. Here’s a structured outline to keep in mind: 1. Data Ingestion Sources and Types: Identify data sources (e.g., databases, APIs, logs, IoT devices) and data types (structured, semi-structured, unstructured). Batch … Continue reading Quick Outline for Designing Data Pipelines for Machine Learning Projects

Understanding Production RAG Systems (Retrieval Augmented Generation)

1. What is RAG ? Retrieval Augmented Generation (RAG), is a method where you have a foundation model, and you have a library of personal documents – this can be unstructured data in any format. Now your goal is for answering some questions from your persona library of docs, with the help of LLM. Enter … Continue reading Understanding Production RAG Systems (Retrieval Augmented Generation)

AI Product Management in Cybersecurity: McKinsey’s Three Horizons of Growth ? Flip it for startups, keep it for mega corps

What’s McKinsey’s Three Horizons of Growth ? The McKinsey’s Three Horizons of Growth is a management framework first introduced in the book “The Alchemy of Growth” published in 2000, which has since been referenced by top product strategists to help businesses execute existing business models while simultaneously innovating and pushing the boundaries and creating new … Continue reading AI Product Management in Cybersecurity: McKinsey’s Three Horizons of Growth ? Flip it for startups, keep it for mega corps

The Game Changer: Large Language Models Unleashing the Power of AI in Cybersecurity

Applied Machine Learning and AI in cybersecurity is slowly growing into mainstream industry, not just as an add-on anymore. As threat actors have started automating and streamlining a lot of their attack pipelines using off the shelf Large Language Models, the good actors are essentially forced to catch up with them ! It’s not just … Continue reading The Game Changer: Large Language Models Unleashing the Power of AI in Cybersecurity