Open in app
Home
Notifications
Lists
Stories

Write
Wipro Tech Blogs
Wipro Tech Blogs

Home

About

Aug 2

Davinci vs Curie: A comparison between GPT-3 engines for extractive summarization

By Jaanam Haleem, Kiran Venkata Narasimha Naga “This blog post was not processed by a GPT-3 engine. It was written by a human.” The science of extracting information from textual data has changed drastically over the past decade. According to a study by McKinsey Digital, CEOs spend almost 20% of…

Davinci

9 min read

Davinci vs Curie: A comparison between GPT-3 engines for extractive summarization
Davinci vs Curie: A comparison between GPT-3 engines for extractive summarization

Aug 2

Real-time Fake News Detection and Claim Verification Using Meta Curriculum Learning

By Santanu Pal, Shivam Sharma, Addepelli Sai Srinivas, Sangram Jethy, Nabarun Barua, Vinutha B N Social media for news consumption is a double-edged sword that enables the wide spread of fake news: misinformation and disinformation. The unrestricted and unwarranted virality of fake content has been observed to be detrimental to…

Technology

9 min read

Real-time Fake News Detection and Claim Verification Using Meta Curriculum Learning
Real-time Fake News Detection and Claim Verification Using Meta Curriculum Learning

Aug 2

Automation of Industrial Pick and Place Pipelines Using Computer Vision 3-Dimensional Robotic Bin Picking

By Navya Vepakomma — Overview The focus of today’s industries is lean management where production times and response times are being reduced, and the aim is to increase overall efficiency. Bin picking is a target solution for automating manual, labor intensive, and repetitive tasks where parts need to be picked up from a filled…

10 min read

Automation of Industrial Pick and Place Pipelines Using Computer Vision 3-Dimensional Robotic Bin…
Automation of Industrial Pick and Place Pipelines Using Computer Vision 3-Dimensional Robotic Bin…

May 10

Securing the Software Supply Chain

By Eric Tice Introduction Software is not yet aware and can’t self-identify positive or malicious changes or the impact throughout an interdependent chain of applications, and this is probably a good thing today. But as software is in a constant state of evolution and flux, this presents opportunities for bad…

Wipro

7 min read

Securing the Software Supply Chain: An Introduction to Wipro’s POV
Securing the Software Supply Chain: An Introduction to Wipro’s POV

May 10

Journey to 15 Million Records Per Second: Managing Persistent Connections

By Ayushri Arora, Ruchi Saluja, Raghu Nandan D “Data is the new oil. Like oil, data is valuable, but if unrefined it cannot really be used. It has to be changed into gas, plastic, chemicals, etc. to create a valuable entity that drives profitable activity. so, must data be broken…

Wipro

7 min read

Journey to 15 Million Records Per Second: Managing Persistent Connections
Journey to 15 Million Records Per Second: Managing Persistent Connections

May 10

Efficient Analytics of On-chain Transactions Leveraging Blockchain’s Twin Node

By Hitarshi Meenketu Buch, Dheeraj Budhiraja Setting the Stage The data processed by blockchain has tremendous value and can provide deep business insights. However, the shared ledger residing on each blockchain node cannot be directly consumed for reporting and analytics purposes because of the following technical limitations: On blockchain, underlying…

Wipro

8 min read

Efficient Analytics of On-chain Transactions Leveraging Blockchain’s Twin Node
Efficient Analytics of On-chain Transactions Leveraging Blockchain’s Twin Node

Mar 23

Automating Wooden pole inspections and damage assessments using AI and robotics

By Dr. Sujatha J | Senior Consultant — Robotics Practice, Wipro Introduction Energy transmission- distribution and telecommunication segments are the largest users of utility poles all over the world. These are predominantly made of wood and need to be monitored for their condition regularly and predict their future condition accurately…

Utilities

8 min read

Automating Wooden pole inspections and damage assessments using AI and robotics
Automating Wooden pole inspections and damage assessments using AI and robotics

Mar 23

Cognitive edge computing system design: Some tips and tricks!

By Dr. Manjunath Ramachandra | DMTS Senior Member, Wipro and Vinutha B N. | Distinguished Member & General Manager, Wipro With the proliferation of IoT devices, edge intelligence is expected to go into all application domains. Most of them involve real time interactions and call for extremely low latency in…

Edge Computing

12 min read

Cognitive edge computing system design: Some tips and tricks!
Cognitive edge computing system design: Some tips and tricks!

Mar 23

Assessing the maturity of Open Source adoption in an enterprise

By Ankit Pandey | Architect – Open Source Strategy Advisor, Wipro According to a survey, open source software (OSS) is rated equal to or better than proprietary software by 94% of IT executives. …

Open Source

5 min read

Assessing the maturity of Open Source adoption in an enterprise
Assessing the maturity of Open Source adoption in an enterprise

Feb 22

Trends in Cloud FinOps implementation

By Magesh Kasthuri — IT spend optimization is one of the primary goals for any organization. Cloud service usage for computing, storage, and the network becomes uncontrollable as its cloud footprint grows larger. At this stage, controlling and managing the cost of cloud usage becomes essential. In cloud terminology, this is called FinOps. FinOps…

4 min read

Trends in Cloud FinOps implementation
Trends in Cloud FinOps implementation
Wipro Tech Blogs

Wipro Tech Blogs

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable