"Hello, World!"
MC

MC

Underfitting vs. Overfitting

Underfitting vs. Overfitting

A common challenge in Machine Learning (ML) is underfitting and overfitting. These
Read More
Understanding Cosine Similarity

Understanding Cosine Similarity

Cosine similarity is used to measure how similar things are. Mathematically, it&
Read More
Detecting Outliers using the  Interquartile Range (IQR)

Detecting Outliers using the Interquartile Range (IQR)

Outliers are data points that are significantly distant from the other data
Read More
K-Nearest Neighbors (KNN) Algorithm for Supervised Machine Learning

K-Nearest Neighbors (KNN) Algorithm for Supervised Machine Learning

💡In this blog post we will focus on using the KNN algorithm
Read More
Term Frequency-Inverse Document Frequency

Term Frequency-Inverse Document Frequency

Term Frequency-Inverse Document Frequency (TF-IDF) is a measure of: * How many times
Read More
Symmetric vs. Asymmetric Encryption

Symmetric vs. Asymmetric Encryption

The main purpose of encryption is to convert human-readable plaintext into ciphertext
Read More
API Rate Limiting

API Rate Limiting

API Rate Limiting is used to limit the number of requests a
Read More
Why is API Versioning Important?

Why is API Versioning Important?

An API can change in many different ways. For example, a property
Read More
Cache REST Constraint

Cache REST Constraint

There are 6 REST architectural constraints. Let's talk about the
Read More
HATEOAS

HATEOAS

To understand HATEOAS (Hypermedia as the Engine of Application State), let'
Read More
Don't PUT it, PATCH it

Don't PUT it, PATCH it

There are two options for updating resources: * PUT - used for full
Read More
Content Negotiation

Content Negotiation

If you are building an API to serve just one client then
Read More
"Hello, World!" © 2025
Powered by Ghost