About
I have 21+ years of experience in Software Design and Development. I have designed and…
Articles by Sujeet
Contributions
-
Your team is stuck with an inefficient algorithm. How do you steer them towards a more effective solution?
First, we need to understand what does the "inefficiency" mean in the context being looked at. Say, is it one or more of: - Low throughput (under what conditions?) - High memory consumption - CPU spikes under certain conditions - excessive IO reads/writes (say over the network, disks) Collect data and Drill down: Take thread dumps, Memory dumps. You may need to do it iteratively, and drill down deeper towards the source of the problem. The goal is to identify the problem; often it's more than one problems. Work on a plan, evaluate tradeoffs: It should be based on the scenarios that trigger the problem. Sometimes none of the traded options seem viable. Under such situations, put constraints on the inputs to eliminate such scenarios.
-
You're facing project delays due to algorithm testing. How can you convince stakeholders to adjust timelines?
Remember, the stake holders also have their own decisions to make. Based on my experience, just verbal proposition does not help them decide or reach any conclusion - what they need is "data". Few key points: 1. Justify your delays / shifts with "Data", and quantify the "why" and "by how much" in terms of data (which could be the list of sub-tasks, number of hours estimated per task, number of persons working, etc.) 2. Use rough calculations / statistics to explain how (if any) others did the same problem, in similar situations. And then justify in what ways your approach is different, leading to the expected shifts. A classic example, on how numbers work at the investor's desk: https://abc.xyz/investor/founders-letters/2004/
-
How can you determine if your algorithm is too slow?
When we talk about the complexity, we talk about a way (or a scale) to measure or predict how well the algorithm (when implemented) will "perform", with a given set of constraints. The constraints could be: size-of-input, memory-limits (RAM), heap-limits (virtual memory) data-access latencies (network/disk latencies). It's costly in terms of time/effort/customer-experience, to have an inefficient algorithm implemented, just to realize later, that improving further is a big pain (upgrades, migrations, monitoring, down-times etc.). Thus it's best to be able to predict the performance while it's still on drawing board - and, the Time-Space complexities (i.e. a study of the asymptotic bounds), are broadly taken as ways to measure the same.
Activity
-
Next time you have an idea and it gets rejected, I want you to think of these emails. Sixteen years ago, Airbnb launched, and today, it's worth…
Next time you have an idea and it gets rejected, I want you to think of these emails. Sixteen years ago, Airbnb launched, and today, it's worth…
Liked by Sujeet Banerjee
-
At LinkedIn, we run stateful systems on Kubernetes. Rather than building a operator for each system, we designed an unified operator that…
At LinkedIn, we run stateful systems on Kubernetes. Rather than building a operator for each system, we designed an unified operator that…
Liked by Sujeet Banerjee
Experience
-
VMware by Broadcom
-
-
-
-
-
-
-
-
-
-
Education
-
Indian Institute of Technology, Delhi
-
Did nothing but dabbling with lots of stuff ;)
- Logic and Functional programming; Symbolic Computation; Type-systems...
- Artificial Intelligence, Advanced Computer Graphics...
- Computer Vision, Visual Servoing, CollisionAvoidance, 3D-reconstruction. -
-
Licenses & Certifications
-
Computer Vision Basics
Coursera
Credential ID https://coursera.org/share/b7a78dd0a1af90125d26890dfaa4a555
Publications
-
SQL to XQuery Translation in the AquaLogic Data Services Platform
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering; IEEE Computer Society
SQL has long been the standard language for retrieving and manipulating data in relational database systems. XML has become the standard format for data exchange, and XQuery is on its way to becoming the standard language for querying XML data. The BEA AquaLogic Data Services Platform provides a service-oriented, XML-based view of heterogeneous enterprise data sources and allows this view to be queried using XQuery. AquaLogic DSP includes a JDBC driver that connects the old (SQL) world with the…
SQL has long been the standard language for retrieving and manipulating data in relational database systems. XML has become the standard format for data exchange, and XQuery is on its way to becoming the standard language for querying XML data. The BEA AquaLogic Data Services Platform provides a service-oriented, XML-based view of heterogeneous enterprise data sources and allows this view to be queried using XQuery. AquaLogic DSP includes a JDBC driver that connects the old (SQL) world with the new (XML) world via a SQL-to-XQuery translator. This paper outlines the issues related to creating such a driver and details the approach used to translate SQL queries into XQuery expressions. The paper also touches on performance considerations related to handling XML query results in a context where JDBC result sets are the desired output format.
Other authorsSee publication
Patents
-
SYSTEM AND METHOD FOR DISTRIBUTED ORCHESTRATION MANAGEMENT IN NETWORK FUNCTION VIRTUALIZATION
Issued US-20220035650-A1
A system and method for orchestrating distributed operations to be executed in a distributed computing system with multiple virtual infrastructures uses a distributed operation descriptor to find any Cloud-Native Network Function (CNF) entry in the distributed operation descriptor. For each found CNF entry, a CNF descriptor is retrieved from a CNF catalog and parsed to find an overridable property for a CNF described in the CNF descriptor for which a property override is defined. Then, a target…
A system and method for orchestrating distributed operations to be executed in a distributed computing system with multiple virtual infrastructures uses a distributed operation descriptor to find any Cloud-Native Network Function (CNF) entry in the distributed operation descriptor. For each found CNF entry, a CNF descriptor is retrieved from a CNF catalog and parsed to find an overridable property for a CNF described in the CNF descriptor for which a property override is defined. Then, a target virtual infrastructure is selected from the multiple virtual infrastructures to perform a lifecycle management operation of the CNF. Instructions are then transmitted to a local operator in the target virtual infrastructure with the property override so that information regarding the CNF is transmitted to a local orchestrator of the target virtual infrastructure to perform the lifecycle management operation of the CNF at the target virtual infrastructure using the property override.
Other inventorsSee patent -
SYSTEM AND METHOD FOR PERFORMING FAILURE ANALYSIS ON A COMPUTING SYSTEM USING A BAYESIAN NETWORK
Issued US 11561850 B1
A system and method for performing a failure analysis on a computing system uses a Bayesian network that is generated from a correlation directed acyclic graph (CDAG) of nodes that represent entities in the computing system with edge weights for edges between the nodes. The CDAG is generated using log entries of the computing system with reference to a dictionary file, which specifies entity types, dependency types of the entity types, expressions that return values representing prior…
A system and method for performing a failure analysis on a computing system uses a Bayesian network that is generated from a correlation directed acyclic graph (CDAG) of nodes that represent entities in the computing system with edge weights for edges between the nodes. The CDAG is generated using log entries of the computing system with reference to a dictionary file, which specifies entity types, dependency types of the entity types, expressions that return values representing prior probabilities of failure for the dependency types, and the edge weights for the dependency types. The Bayesian network generated from the CDAG includes conditional probabilities for edges of the Bayesian network based on the edge weights of the CDAG. The Bayesian network is used to compute posterior probabilities of possible causes of a new failure event in the computing system and output at least one probable cause with an associated posterior probability for the new failure event.
Other inventorsSee patent -
SYSTEM AND METHOD FOR IDENTIFYING STALE SOFTWARE-DEFINED NETWORK COMPONENT CONFIGURATIONS
Issued US 11269657 B2
A computer-implemented system and method for identifying stale configurations of a software-defined network (SDN) component uses a configuration export file of the SDN component to generate configuration dependency strands for configurations of the SDN component. The configuration dependency strands can then be classified as being stale based on at least one of path length, reference count and a custom attribute to elements in a network infrastructure for the configuration dependency strands.
Other inventorsSee patent -
SYSTEM AND METHOD FOR GENERATING CORRELATION DIRECTED ACYCLIC GRAPHS FOR SOFTWARE-DEFINED NETWORK COMPONENTS
Issued US US 11093549 B2
A computer-implemented system and method for generating a correlation directed acyclic graph (CDAG) of configurations of a software-defined network (SDN) component for migration from a source computing environment to a destination computing environment uses a configuration export file of the SDN component to draw the CDAG. Correlation keys defined in the configuration export file are used to draw graph nodes. Contents associated with the correlation keys and template entries are used to draw…
A computer-implemented system and method for generating a correlation directed acyclic graph (CDAG) of configurations of a software-defined network (SDN) component for migration from a source computing environment to a destination computing environment uses a configuration export file of the SDN component to draw the CDAG. Correlation keys defined in the configuration export file are used to draw graph nodes. Contents associated with the correlation keys and template entries are used to draw edges between at least some of the graph nodes. The CDAG with the graph nodes and the edges is then displayed.
Other inventorsSee patent -
SYSTEM AND METHOD FOR MIGRATING NETWORK POLICIES OF SOFTWARE-DEFINED NETWORK COMPONENTS
Issued US US010924346 B1
-
SYSTEM AND METHOD FOR MANAGING PUBLIC IP ADDRESSES FOR VIRTUAL DATA CENTERS
Issued US US 10868760 B2
System and Method for managing public IP Addresses for Virtual Datacenters
Other inventorsSee patent -
MULTI-SUBNET PARTICIPATION FOR NETWORK GATEWAY IN A CLOUD ENVIRONMENT
Issued US US 10,313,428 B2
A network management server allocates network addresses to a network gateway connected to a public network after receiving an allocation request that specifies a number of network addresses to allocate to the network gateway. The network management server determines a first and second subnets of the public network having, respectively, first and second pools of available network addresses capable of being allocated to devices on the public network, and allocates one or more available network…
A network management server allocates network addresses to a network gateway connected to a public network after receiving an allocation request that specifies a number of network addresses to allocate to the network gateway. The network management server determines a first and second subnets of the public network having, respectively, first and second pools of available network addresses capable of being allocated to devices on the public network, and allocates one or more available network addresses from the first and second pools to the network gateway.
Other inventorsSee patent -
FASTER IP ADDRESS ALLOCATION IN A HYBRID CLOUD ENVIRONMENT USING SUBNET SELECTIVE RANDOMIZATION
Issued US US 10,142,284 B2
Embodiments of the present disclosure provide a method for allocating IP addresses. The method includes identifying, by a first gateway operating within a first cloud computing environment, a current subnet that includes at least one available IP address for allocation from a global pool of IP addresses that is in communication with the first gateway and a second gateway operating within a second cloud computing environment that is securely separate from the first cloud computing environment…
Embodiments of the present disclosure provide a method for allocating IP addresses. The method includes identifying, by a first gateway operating within a first cloud computing environment, a current subnet that includes at least one available IP address for allocation from a global pool of IP addresses that is in communication with the first gateway and a second gateway operating within a second cloud computing environment that is securely separate from the first cloud computing environment. The method also includes randomly selecting an available IP address from the current subnet for allocation. The method further includes requesting allocation of the available IP address from the global pool of IP addresses.
Other inventorsSee patent -
SYSTEM AND METHOD FOR TRANSLATING SQL QUERIES INTO XML QUERY LANGUAGE
Filed US PCT/US2006/003138
In accordance with embodiments, there are provided mechanisms and methods for translating Structured Query Language (SQL) queries into extended Markup Language (XML) query language to allow Service Oriented Architecture (SOA) compliant applications to interact with SQL based information systems. As shown in Figure 2A, determining from Data Services Platform artifacts, a correspondence with SQL database artifacts (block 202). Then, at least one SQL query is translated into at least one…
In accordance with embodiments, there are provided mechanisms and methods for translating Structured Query Language (SQL) queries into extended Markup Language (XML) query language to allow Service Oriented Architecture (SOA) compliant applications to interact with SQL based information systems. As shown in Figure 2A, determining from Data Services Platform artifacts, a correspondence with SQL database artifacts (block 202). Then, at least one SQL query is translated into at least one equivalent expression in XQuery based upon the determined correspondence (block 204). The Data Services Platform can then compile and execute the XQuery.
Other inventorsSee patent
Courses
-
Advanced Algorithms
-
-
Advanced Computer Graphics
-
-
Artificial Intelligence
-
-
Computer Graphics
-
-
Computer Vision
-
-
Cryptography Algorithms and Network Security
-
-
Data Structures and Algorithms
-
-
Information Security and Cryptograhy
-
-
Introduction to Logic and Functional Programming
-
Projects
-
xpath-for-json
-
This project is a utility to allow using XPath over JSON. While "JSONPath" (another open-source project) is an alternative that is widely used (and is available in Java, Python and Scala), this project offers the goodness of the good old XPath (which was originally built for XML data - https://www.w3schools.com/xml/xpath_syntax.asp) and all those research, into the JSON world, and is simple and intuitive.
Having the XPath syntax goes well with the community that is already well versed in…This project is a utility to allow using XPath over JSON. While "JSONPath" (another open-source project) is an alternative that is widely used (and is available in Java, Python and Scala), this project offers the goodness of the good old XPath (which was originally built for XML data - https://www.w3schools.com/xml/xpath_syntax.asp) and all those research, into the JSON world, and is simple and intuitive.
Having the XPath syntax goes well with the community that is already well versed in the XPath-syntax and do not want another set of syntax for to work with JSON. Additionally, using this tools allows one to build custom functions that can be used with the filter expressions.
Recommendations received
3 people have recommended Sujeet
Join now to viewMore activity by Sujeet
-
ℹ️ Over 80% of breaches involve compromised identity whether it's the initial compromise or how the threat moves laterally. The stakes have never…
ℹ️ Over 80% of breaches involve compromised identity whether it's the initial compromise or how the threat moves laterally. The stakes have never…
Liked by Sujeet Banerjee
-
Saudi Arabia-based fintech Lean Technologies has secured $67.5 million in Series B funding round, led by General Catalyst, with participation from…
Saudi Arabia-based fintech Lean Technologies has secured $67.5 million in Series B funding round, led by General Catalyst, with participation from…
Liked by Sujeet Banerjee
-
⚡ GenAI ⚡ This name means a lot of things to lot of people. While one is focused on bringing business value from Gen AI, the cost of running Gen AI…
⚡ GenAI ⚡ This name means a lot of things to lot of people. While one is focused on bringing business value from Gen AI, the cost of running Gen AI…
Liked by Sujeet Banerjee
-
Riyadh-based fintech Lean Technologies has raised $67.5 million in Series B funding led by General Catalyst, marking the investor's first involvement…
Riyadh-based fintech Lean Technologies has raised $67.5 million in Series B funding led by General Catalyst, marking the investor's first involvement…
Liked by Sujeet Banerjee
-
Your next dream job is on Instahyre. Click below to get priority access!
Your next dream job is on Instahyre. Click below to get priority access!
Shared by Sujeet Banerjee
-
I agree. We aren't paid by employer for what we are worth, we are paid enough so that we don't quit! Further, we aren't paid based on our value or…
I agree. We aren't paid by employer for what we are worth, we are paid enough so that we don't quit! Further, we aren't paid based on our value or…
Liked by Sujeet Banerjee
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Sujeet Banerjee in India
-
Sujeet Banerjee
Executive Director
-
Sujeet Banerjee
REGIONAL MANAGER NORTH AYSUN PERSONAL CARE
-
Sujeet Banerjee
Expertise in International Business
-
Sujeet Banerjee
Working as a Sales Officer at Campus Activewear Ltd.
24 others named Sujeet Banerjee in India are on LinkedIn
See others named Sujeet Banerjee