Data Science

Building a Streaming OpenAI App in Python
In a world where technology is advancing at breakneck speed, OpenAI APIs stand out as a game-changing...

Anomaly Detection for Time Series Data: Part 2
In our previous post, Anomaly Detection for Time Series Data: Part 1, we looked into the importance...

Anomaly Detection for Time Series Data: Part 1
Your biggest sale of the season is starting, your engineers have deployed big changes to support the...

A Gentle Introduction to Generative Adversarial Networks (GANs) with Marketing Applications
Have You Ever Found Yourself in the Following Situations? You have to list your products online but...

Maximising Your A/B Test Outcomes with Multi Armed Bandits
Traditional A/B testing has stuck around for decades and is an important tool in a marketer’s toolkit,...

How to Analyse Marketing Surveys – Part 2
In our previous blog post, we analysed survey data using univariate analysis. We explored each survey question...

My Product Design Internship Experience
This post was contributed by Vaidehi Vartak. From March to June in 2021, I interned at CleverTap...

7 Principles I follow to Design for the Enterprise
While working in a company, especially a larger team or an organization that’s beyond the early-stage startup...

Designing The Future Of CleverTap: A Q&A With Our Head Of Design
As our platform evolved over the last six years to respond to market needs, its tools grew...

What is UX Writing? Lessons from Writing for an Enterprise SaaS Product
It’s been over 6 months since I’ve started writing for a B2B enterprise product — CleverTap. Having...

From Inbox to Brand Connection: Building Trust with Visual Identity in Emails
Most brands across the globe use email as a go-to communication medium for individual and business needs....

Building a Streaming OpenAI App in Python
In a world where technology is advancing at breakneck speed, OpenAI APIs stand out as a game-changing...

A Quick Intro to SPF and DKIM
Hosting a Party? Understanding SPF and DKIM is Like Managing Email Security! Imagine you're hosting a party...

Scaling up for IPL 2023
We’ve had some great feats when it comes to performance engineering, but the one that occurred recently,...

Anomaly Detection for Time Series Data: Part 2
In our previous post, Anomaly Detection for Time Series Data: Part 1, we looked into the importance...

Demystifying G1 GC, GCLocker, JNI Critical, and Fake OOM Exceptions
This post is co-authored together with Hardik Shah and Avneesh Sharma. TesseractDBTM runs on the JVM, which...