Hot & New
By using just an image on a mobile device, the search application is designed to return matches from the database that are either identical or bear a high resemblance to the original uploaded image. Here, we describe the technology behind this powerful functionality.
How do you approach creating a system that finds the right supplier and provides a price in less than 3 seconds using hundreds of data points? By approaching this system as an ERP system in the cloud, we were able to keep the system fast at a low cost. Here we share how we did it.
Which vector database is best to use? It depends. Based on our experiences using them, there is no one-size-fits-all "best" database. Rather, a Superior Vector Database is one that is well-matched with its use case, meeting the unique requirements of that scenario. Read our comparative analysis to discover why.
Today, there is no easy way to convert raw text from volumes of academic papers into structured data, or complete information extraction (IE). Traditional IE methods often rely on labor-intensive handcrafted rules and patterns, which may not generalize across diverse domains and languages. We used various Large Language Models (LLMs) from GPT to Claude to complete IE from these documents and compared their performance. We share what we learned here.
Dependency conflicts, version compatibility, and maintaining a clean dependency tree can make dependency management challenging. However, effective use of Gradle and Dependency Injection (DI) ensures a smooth process and maintains a modular architecture that follows the principles of Clean Architecture. Read how we have successfully achieved this on our projects.
If you need to release complex features but want to align with the principles of Continuous Integration and Continuous Deployment (CI/CD), we outline here an approach that we use with our clients. By breaking down large features into manageable components, we have noticed that organizations can mitigate issues, ensure smoother data management and migration, and minimize disruptions to dependent clients. Further, this approach supports an Agile and iterative deployment process, enhancing stability and the user experience.
To us, our Quality Assurance (QA) team does much more than making sure that features work. Our QA team is working to elevate software quality, enhance team performance, and improve project delivery overall. Here, we share with you the QA strategies we leverage for our projects, all of which evolved from our client projects. We'll also show how embracing these methods can not only mitigate difficulties but improve results.
Overwhelmed by all of the tools available for the front-end build pipeline in your organization? Don't worry. We gathered all that we have learned about these tools while working on our projects and summarized it here. We collected all of the advice into a single place.
Users expect to see real-time data while using apps and don't want to refresh the screen. Achieve this by using Reactive Programming. In this article, discover why Reactive Programming exists and how it enables our apps to update with new data in real-time.
You may have heard how programmatic SEO could be a way to boost site traffic from search engines and increase leads. It can be intimidating to consider how to implement it, knowing the complexities it can bring. Here, we describe how we designed the system with our client and implemented it, along with our reflections during the experience. Additionally, we outline the many benefits our client experienced after launch.
Image Quality Assessment (IQA), specifically Objective Blind or no-reference IQA, is a crucial function to determine image fidelity or the quality of image accuracy. Further, IQA helps maintain the integrity of visual data, ensuring its accurate representation. Here, we share an analysis of the best machine learning models that support IQA, diving deeper into their operations, the challenges and advantages, and its significance in the ever-evolving field of image quality assessment.
Deploying a smart contract on the public blockchain is a significant milestone, but it's also fraught with risk. The immutability of blockchain technology means that any flaws in the contract's code can have irreversible consequences. In this guide, we will walk you through a systematic and detailed approach to ensure that your smart contract functions as intended, remains secure against malicious attacks, and is optimized for performance and cost-effectiveness.
We created this guide to help people new to Web3 and the dApp Infrastructure get started using this technology in their organizations. The design of Web3 apps is much more decentralized than that of Web2. New services are constantly appearing to make building and running these projects easier and safer. Engineers must know how each part works to create effective Web3 apps. And we describe this here.