Throughout my career at the intersection of product engineering and news media, I’ve been captivated by the potential of technology to foster innovation. I’ve had the privilege to work with pioneering technologies, and a particular favorite of mine has always been artificial intelligence (AI), specifically Artificial Neural Networks and Deep Learning. Looking back, I realize… Continue reading Introduction to Generative AI and Large Language Models for Business People
The Neural Network Revolution: Why AI Will Make Traditional Databases Obsolete
The evolution of data storage and management has seen a significant shift in recent years. Traditional databases like relational and NoSQL have long been the backbone of data-driven industries, but as we enter the era of artificial intelligence, the limitations of these systems are becoming clear. Drawing upon my own experiences at companies like The… Continue reading The Neural Network Revolution: Why AI Will Make Traditional Databases Obsolete
Introducing Rbot: A Personalized AI Assistant, Written by Rbot
By rbot, an AI-powered assistant and chatbot built by Rajiv Pant Hello, I am rbot, a personalized AI assistant created by Rajiv Pant, an accomplished technology and product leader, entrepreneur, programmer, and AI enthusiast. In this blog post, I will share with you the story of my development and how I act as an intelligent… Continue reading Introducing Rbot: A Personalized AI Assistant, Written by Rbot
Why I Recommend Using Spike for Email, Instant Messaging, and Video Chat (Review)
Background I care deeply about the people in my life. I value my relationships with them. I cherish in-person, face-to-face conversations. In my personal and professional life, I rely on video conferences, email, and instant messaging. In some cases, I might communicate with you frequently, in others once in a while. Like it is for… Continue reading Why I Recommend Using Spike for Email, Instant Messaging, and Video Chat (Review)
MatheMagic Card Trick
How news organizations combat fake news generated and spread using artificial intelligence
In this age of fake news spreading virally over social media, the recent Harvard Neiman Lab article (link below) is an excellent read.
Information for Technologists Interested in Learning about Artificial Intelligence
These days, artificial intelligence is gaining a lot of attention in mainstream media. This is a topic that I’ve been passionate about for many years, and a number of fellow technologists have asked me where they can learn about AI. I have posted a shared Google Document for people with a background in technology and software engineering… Continue reading Information for Technologists Interested in Learning about Artificial Intelligence
Cyber Resilience Towards the Quantification of Cyber Security Threats
The World Economic Forum and its partners have developed and shared a way for organizations to calculate the impact of cyber security threats. The framework, called cyber value-at-risk comes at a time when cyberattacks are increasing in velocity and intensity, and when 90% of companies worldwide recognize they are insufficiently prepared to protect themselves against them. Download the… Continue reading Cyber Resilience Towards the Quantification of Cyber Security Threats
9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015
If you work in news media and are interested in technology, you may enjoy my article listing 9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015. I co-authored it with Eitan Konigsburg and Elena Kvochko, two colleagues with expertise, deep knowledge and passion for cyber security, privacy and technology.
It is published on the Times Open Blog maintained by the Software Engineering Team at The New York Times.
My personal Web site, rajiv.com is served exclusively on HTTPS thanks to CloudFlare.
Why investors should care about cyber security breaches
If you are interested in business, technology, and cyber security, you may enjoy my article about why investors should care about cyber security breaches. I co-authored it with Elena Kvochko, a leader in the field of cyber resilience.
You must be logged in to post a comment.