Posts

Showing posts with the label Technical Questions

Module 2 - Machine Learning for Product Managers

Image
  Machine Learning for Product Managers — [2/6] We have started an online course to educate Product Managers/ Business Managers about Machine learning. Subscribe to our Youtube Channel —  Technomanagers What will you learn in this course? In this course, we will tell you how to turn the business need into a machine learning problem, and then make a prototype out of it. If that performs well then how to deploy and productionise it. This course is divided into 6 modules. In the first module, we will see, see the introduction to machine learning In the second module, we will see when to say yes or no to machine learning. Machine learning is very mainstream nowadays so it is very important for a manager to know when to say yes and when to say no. In the third module, we will see how to use machine learning weapons. In the fourth module, we will see how to prepare the training data for machine learning, that’s the first step in developing any machine learning model. From there we will move

Module 1 - Machine Learning for Product Managers

Image
We have started an online course to educate Product Managers/ Business Managers about Machine learning. Machine Learning for Managers — Module 1 Subscribe to Youtube Channel —  Technomanagers What will you learn in this course? In this course, we will tell you how to turn the  business need into a machine learning problem , and then make a prototype out of it. If that performs well then how to deploy and productionise it. This course is divided into 6 modules. In the first module, we will see, see the introduction to machine learning In the second module, we will see when to say yes or no to machine learning. Machine learning is very mainstream nowadays so it is very important for a manager to know when to say yes and when to say no. In the third module, we will see how to use machine learning weapons. In the fourth module, we will see how to prepare the training data for machine learning, that’s the first step in developing any machine learning model. From there we will move on to our

Design a URL shortener? — System Design for Product Managers

Image
  URL Shortener URL shortener is the way by which we can reduce the size of the big URL into a smaller one and clicking on the smaller URL will take you the original one. The smaller URL is easy to share and doesn’t occupy much space. It is very useful while doing some tweets. Design Requirement Functional Requirement URL shortener should be able to shorten any URL given to it, and it should be unique alias of it. When the user clicks on the shortened link, the user should get directed to the original link. The user should be able to define the time till which it is available. Non Functional Requirement The availability of the system should be high because if our system goes down, then all the URLs will start failing. URL should be available in minimal time; minimum latency should be there. The URL shouldn’t be predictable. Capacity Estimation We can assume that for every URL shortening service, there would be 100 reads. So basically, there would be a 100:1 read/write ratio to the syst

How does Dark Web works? Security and Hacking concepts for Product Manager

Image
1. How can criminals hold your computer for Ransomware? Ransomware is a type of malware that can damage your computer; it is a piece of software code that locks or encrypts your important files until you pay the amount demanded by hackers. This type of malware comes via email or as an attachment to download. It exploits a flaw in the operating system and runs malicious code on your computer. Once this runs on your computer, it locks all your files and gets decrypted only when you pay the amount. They take money in  b itcoins through a specialized wallet that doesn’t store any kind of information. This ensures that their information is hidden from the government. How can you prevent ransomware? One of the most effective ways to protect from this kind of malware is to have high-security encryption in the operating system. Large organizations like hospitals, governments etc., are at high risk, so they should spend a great amount of money on their IT infrastructure. Another solution is to