Aditya Chatterjee's Blog, page 15
October 16, 2023
Cold start and Data sparsity problem in Recommender system
3.1 The Cold Start Problem in Other DL Systems
3.2 Issues Arising from the Cold Start Problem
3.3 Technical Solutions and ImpactThe Data Sparsity Problem
4.1 Data Sparsity in Other DL Systems
4.3 Issues Arising from Data Sparsity
4.3 Technical Solutions and ImpactDifferentiating Between Cold Start and Data SparsityPractical ApplicationsConclusionReferences1. Introduction:
Recommender systems...
Canary and Rolling Deployments strategies explained

Nothing beats the sensation of pushing your code to production.
The feeling you get upon seeing your code going live, to be tried out by real users, is just mesmerizing. But, this feeling can be short-lived or may even remain unexperienced if the deployment strategy employed isn't the most suitable one for the project in question or a given scenario.
According to OpenShift:
A deployment strategy is a way to change or upgrade an application with the aim of no perce...
October 9, 2023
Minimize Maximum Distance between Gas Stations [Solved 3 approaches]
Streamlit library in Python [Practical Introduction]
Data analysis is one of the areas where Python shines as a language. ...
Web Video Text Tracks Format (WebVTT): for adding Video Subtitles
TABLE OF CONTENTS
What is WebVTT?WebVTT filesWebVTT bodyWebVTT cuesWebVTT commentsStyling WebVTT cuesInstance methods and propertiesSpecificationsBrowser compatibilityWebVTT TutorialKey Takeaways (WebVTT)WebVTT is a format for HTML5 video captions, subtitles and overlays. It is a text file with timed cues, and it starts with a WebVTT body. Cues display text at specific times, while comments are added as notes. You can style cues to enhance presentation.
What is WebVTT?WebVTT (W...
JvmStatic, JvmOverloads and JvmFields Annotations in Kotlin
In...
Concept and Data Drift in Deep Learning
Polyak Averaging
October 7, 2023
System Design of an Incident Response Platform
Table of contents
IntroductionIncident Response PlatformFunctionalityHigh-level designSelect monitoring targetsDetect incidentLook into incidentClassify incidentRespond to incidentContaining incidentEliminating incidentRecover from incidentDatabase solutionCapacity estimatesStorageNumber of servers neededConcepts and technologiesNetwork segmentationIntrusion Detection SystemsWeb Application FirewallsIndicators of compromiseData backup softwareNetwork-attached...