About
Services
Articles by Neeraj
Activity
-
Replace your cringe inspirational Steve Jobs posters at work with Linus Torvalds. Linus Torvalds could not afford a UNIX license so, he created…
Replace your cringe inspirational Steve Jobs posters at work with Linus Torvalds. Linus Torvalds could not afford a UNIX license so, he created…
Liked by Neeraj Garg
-
🚀 Super proud of the team for developing key AI capabilities that empower merchants and elevate the user experience on Uber…
🚀 Super proud of the team for developing key AI capabilities that empower merchants and elevate the user experience on Uber…
Liked by Neeraj Garg
-
GIGA, Quattr's SEO Agent technology, is working; driving more visibility in net new keyword spaces leading to more clicks in an environment clicks…
GIGA, Quattr's SEO Agent technology, is working; driving more visibility in net new keyword spaces leading to more clicks in an environment clicks…
Liked by Neeraj Garg
Experience & Education
Publications
-
Algorithmic content generation for products.
Big Data 2015
Content is one of the most essential parts of products on e-commerce websites such as eBay. It not only drives user-engagement but also traffic from various search engine websites based on the relevance. Generating the content for the products, however comes with a wide set of challenges, due to the complexity of commerce at scale, and requires new applications in text processing and information extraction to address some core issues. Some of the factors which need to be addressed are:…
Content is one of the most essential parts of products on e-commerce websites such as eBay. It not only drives user-engagement but also traffic from various search engine websites based on the relevance. Generating the content for the products, however comes with a wide set of challenges, due to the complexity of commerce at scale, and requires new applications in text processing and information extraction to address some core issues. Some of the factors which need to be addressed are: scalability (millions of products), dynamism (products change with time), removal of item-specific or seller specific information (maintain generality), size of the content etc. Generally, curators are hired for writing the product descriptions manually, which is not cost-effective and is not scalable. In the current work, an algorithmic framework based on Natural Language Processing and Deep Learning is proposed and used to generate the content for ecommerce products. Seller descriptions for multiple items aggregated at a product level are used for content generation. Furthermore, a combination of behavioral and text signals such as search queries are also used to understand the user intent. Two different approaches are proposed in this work: Extraction (sentence retrieval) and Abstraction (sentence generation). The results of both the methods are analyzed and it is depicted that algorithmic content generation is scalable, fast and has potential to cut down the manual curation cost dramatically.
Other authorsSee publication
Patents
-
Account related task processing
Issued US 7,949,575
A system for periodic and real-time processing of accounts. The system operates in a bulk mode and an error mode. A bulk component concurrently processes a set of eligible accounts with a set of dependent tasks, and a removal component removes one or more accounts from the eligible accounts if an error is associated therewith. In bulk mode, each task fetches only the required set of accounts/subscriptions/payment instruments for processing. In error mode (retry/reprocess mode), if an account…
A system for periodic and real-time processing of accounts. The system operates in a bulk mode and an error mode. A bulk component concurrently processes a set of eligible accounts with a set of dependent tasks, and a removal component removes one or more accounts from the eligible accounts if an error is associated therewith. In bulk mode, each task fetches only the required set of accounts/subscriptions/payment instruments for processing. In error mode (retry/reprocess mode), if an account encounters an error for a task in the bulk mode, the account drops is removed from bulk mode and becomes ineligible for fetching in any future bulk-mode task processing. Error-mode processing tests and processes all tasks sequentially for an errored account until the account state is in par with the accounts being processed by bulk mode. Then the account is removed from error mode processing and is picked up appropriately by bulk-mode processing
-
Configuring security mechanisms utilizing a trust system
Issued US 7,853,992
Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication…
Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.
-
Variable rate sampling for sequence analysis
Issued US 7,565,366
Variable rate sampling may be used across a set of software services or for the same software service to construct a sequence of sampling sets. Users are selected over a time period using a sampling scheme to create the sampling sets. The sampling rate may change over time depending upon the underlying data that is desired, the software service that is used, and the anticipated population of users that may access the software service. The sampling sets may be combined to develop a common set…
Variable rate sampling may be used across a set of software services or for the same software service to construct a sequence of sampling sets. Users are selected over a time period using a sampling scheme to create the sampling sets. The sampling rate may change over time depending upon the underlying data that is desired, the software service that is used, and the anticipated population of users that may access the software service. The sampling sets may be combined to develop a common set for subsequent analysis to provide information regarding a total population of users
-
Rating and settlements engine
Issued US 7,505,962
A rating and settlements engine synthesizes activity data to discover ratable events. The ratable events are processed to produce a rated event. In a described implementation, the ratable events are discovered responsive to an event-generation plug-in and/or the rated events are produced from the ratable events responsive to a rating-model plug-in.
-
Data validation using signatures and sampling
Issued US 7,484,096
Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a…
Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process
-
Using invariants to validate applications states
Issued US 7,457,791
Architecture that facilitates discerning integrity of a data handling system. The architecture includes an identification component that periodically applies to data, in a batch mode, a context-based rule, the rule identifying anamolous data that does not satisfy the rule. A healing component is included to further rectify and/or flag the identified anomalous data.
-
Method and system for automatically interpreting computer system performance
Issued US 7016809
An improvement in applying and interpreting encoded knowledge about computer system performance engineering and in enabling a user to more readily understand and apply that knowledge to improve computer system performance. Textual and graphical depictions of insights, advice, behaviors, and explanations can be presented, all related to improving computer system performance. Fuzzy logic can be employed to accommodate incomplete measurement data and to present results in a qualitative format…
An improvement in applying and interpreting encoded knowledge about computer system performance engineering and in enabling a user to more readily understand and apply that knowledge to improve computer system performance. Textual and graphical depictions of insights, advice, behaviors, and explanations can be presented, all related to improving computer system performance. Fuzzy logic can be employed to accommodate incomplete measurement data and to present results in a qualitative format, presenting relevant data as being high, low, substantial, etc., rather than simply presenting the values of the associated counters leading to those determinations. Intermediate values used to generate the results can also be processed with qualitative rather than quantitative values.
Other inventors -
-
SOFTWARE-BASED ALIASING FOR ACCESSING MULTIPLE SHARED RESOURCES ON A SINGLE REMOTE HOST
Filed US 20090327502
In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in…
In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.
-
DATA DRIVEN COMPONENT REPUTATION
Filed US 20090281819
Various technologies and techniques are disclosed for observing the real-world performance of components and using the collected data to improve other user experiences. Configuration data, usage data, and user experience data are collected for components on observed solution instances. The configuration data, usage data, and user experience data are analyzed to generate component diagnostic data that can be used to make recommendations to one or more advised solution instances as to how to…
Various technologies and techniques are disclosed for observing the real-world performance of components and using the collected data to improve other user experiences. Configuration data, usage data, and user experience data are collected for components on observed solution instances. The configuration data, usage data, and user experience data are analyzed to generate component diagnostic data that can be used to make recommendations to one or more advised solution instances as to how to correct a problem being experienced on the one or more advised solution instances. In one implementation, the component diagnostic data generated includes a reputation rating for each of the components
-
NETWORK TOPOLOGY DETECTION USING A SERVER
Filed US 20090248840
Various technologies and techniques are disclosed for automatically detecting whether a local network that a computer is connected to is a public or private network by utilizing a trusted online service and/or heuristics. Techniques are also described for detecting whether or not two computers are connected to the same local area network.
-
Hierarchical drift detection of data sets
Filed US 20060020594
The present leverages data hierarchies to provide a systematic means to determine data differences between equivalent data. This allows disparate data storage systems to efficiently determine divergent data locations by utilizing, for example, data signatures representative of varying degrees of data granularity. Comparative analysis can then be performed between the databases by employing an iterative approach until the desired level of data granularity is obtained. This allows, in one…
The present leverages data hierarchies to provide a systematic means to determine data differences between equivalent data. This allows disparate data storage systems to efficiently determine divergent data locations by utilizing, for example, data signatures representative of varying degrees of data granularity. Comparative analysis can then be performed between the databases by employing an iterative approach until the desired level of data granularity is obtained. This allows, in one instance of the present invention, discrepant data to be determined without the transfer of large amounts of data and without requiring homogeneous data storage systems. Another instance of the present invention utilizes equivalent logical data views from non-identical data sets to determine data discrepancies. Yet another instance of the present invention determines discrepancies of a federated and/or integrated data system by employing reversible data statistical signatures, providing a simplistic transfer protocol and sheltering each data system from the other's complexities
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
-
Sanskrit
Elementary proficiency
Recommendations received
20 people have recommended Neeraj
Join now to viewMore activity by Neeraj
-
Cheating in job interviews with AI is the new norm Meta just announced it will allow candidates to use an AI assistant during coding…
Cheating in job interviews with AI is the new norm Meta just announced it will allow candidates to use an AI assistant during coding…
Liked by Neeraj Garg
-
🚀 1.5 million+ merchants. 11,000+ cities. 6 continents. One powerful platform: Uber Eats. At Uber, we’re building more than a delivery app—we’re…
🚀 1.5 million+ merchants. 11,000+ cities. 6 continents. One powerful platform: Uber Eats. At Uber, we’re building more than a delivery app—we’re…
Liked by Neeraj Garg
-
Many people have told us that this is one of the most memorable opening paragraphs they've come across in a book. 🙏 The funny thing is that the…
Many people have told us that this is one of the most memorable opening paragraphs they've come across in a book. 🙏 The funny thing is that the…
Liked by Neeraj Garg
-
Tech succeeds wildly when it unlocks latent demand by either 10x convenience or 1/10 cost or a combo of 3x and 1/3, not by serving what demand…
Tech succeeds wildly when it unlocks latent demand by either 10x convenience or 1/10 cost or a combo of 3x and 1/3, not by serving what demand…
Liked by Neeraj Garg
-
Exciting launches from the team to help Uber Eats Merchants and Consumers with Gen AI. Congratulations, Team! https://lnkd.in/gSkj75pA
Exciting launches from the team to help Uber Eats Merchants and Consumers with Gen AI. Congratulations, Team! https://lnkd.in/gSkj75pA
Shared by Neeraj Garg
-
I love the product that we have built. It is so exciting to hear from customers and prospects how well they resonate with Revefi’s offering. This…
I love the product that we have built. It is so exciting to hear from customers and prospects how well they resonate with Revefi’s offering. This…
Liked by Neeraj Garg
-
Recently, we closed our Series D at a $4.5B+ valuation. Our mission is simple: Create products of equal or greater quality than the leading luxury…
Recently, we closed our Series D at a $4.5B+ valuation. Our mission is simple: Create products of equal or greater quality than the leading luxury…
Liked by Neeraj Garg
-
I recently left Amazon after nearly 10 years. I think I pinged all of my friends there before leaving, but if I missed you somehow, thanks for…
I recently left Amazon after nearly 10 years. I think I pinged all of my friends there before leaving, but if I missed you somehow, thanks for…
Liked by Neeraj Garg
-
Memento I'm not a movie person, but one of the engineers on the team asked me to watch the 2001 movie Memento to understand why memory is a…
Memento I'm not a movie person, but one of the engineers on the team asked me to watch the 2001 movie Memento to understand why memory is a…
Liked by Neeraj Garg
-
Middle managers aren't going away. They're getting a re-org. This HBR piece nails it: AI will free managers from tasks that drain time—but not…
Middle managers aren't going away. They're getting a re-org. This HBR piece nails it: AI will free managers from tasks that drain time—but not…
Liked by Neeraj Garg
-
I generally don’t do political posts on LinkedIn. This pains me. Irrespective of whom you support and what your political affiliation is, this is not…
I generally don’t do political posts on LinkedIn. This pains me. Irrespective of whom you support and what your political affiliation is, this is not…
Liked by Neeraj Garg
-
🙏 First of all, our sincere gratitude to everyone who remembered us and has reached out following the Supreme Court's landmark guidelines on student…
🙏 First of all, our sincere gratitude to everyone who remembered us and has reached out following the Supreme Court's landmark guidelines on student…
Liked by Neeraj Garg
-
GIGA x James F. Gibbons is the most deadly combination that only your competition should have to deal with in 2025. James worked closely with a…
GIGA x James F. Gibbons is the most deadly combination that only your competition should have to deal with in 2025. James worked closely with a…
Liked by Neeraj Garg
-
ClearFeed is about to get Agentified. Very happy to see our first Agentic integration - #Okta - rolling out. #IT Support teams using ClearFeed for…
ClearFeed is about to get Agentified. Very happy to see our first Agentic integration - #Okta - rolling out. #IT Support teams using ClearFeed for…
Liked by Neeraj Garg
-
RAG! DevRev started building it before it was called a thing... Super proud of the DevRev team on the approval of one of the most fundamental…
RAG! DevRev started building it before it was called a thing... Super proud of the DevRev team on the approval of one of the most fundamental…
Liked by Neeraj Garg
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Neeraj Garg in United States
-
Neeraj Garg
-
Neeraj Garg
-
Neeraj Garg
-
Neeraj Garg
Principal Enterprise Architect Applications - ADMCOE
15 others named Neeraj Garg in United States are on LinkedIn
See others named Neeraj Garg