Event Sourcing is powerful way to think about domain objects and transaction processing. Rather than persisting an object in it's current state, event sourcing instead writes an immutable log of deltas (domain events) to the database. from this set of events, an object's state is derived, at any point in the past, simply by replaying the event history sequentially.
Event sourcing is a deceptively radical idea which challenges our contemporary notions about transaction processing, while also being a mature pattern with a long history. This talk will take a look at how event processing is used across a spectrum of use cases, including database engines and financial systems.
In Onebip we developed a reporting system based on CQRS (Command Query Responsibility Segregation) and Event Sourcing using MongoDB.
In this talk I will introduce CQRS and Event Sourcing concepts, I will talk about our path and technical and conceptual challenges we faced, the strenght of our solution and the parts where there's room for improvement.
Nobody wants to work in a large ball of mud that becomes harder to manage as time goes on. Proven software architectures tells us to break the system into more manageable components that are isolated from each other.
Years back (before Composer) in symfony1 era we had a single SVN repository, that required a lot of discipline to keep our codebase decoupled and clean. After migrating to Symfony 2 we broke the project into more manageable components that were in separate Git repositories. Unfortunately it quickly became a huge overhead and nightmare to deal with.
We learned the hard why that all the benefits come from having isolated packages not breaking things into separate repositories.
Now we have a single Git repository, again. This isn't a bad idea; to my knowledge Facebook, Twitter, and Google all have a big monolithic source repos but we needed a solution that works for a lot smaller fish :)
With a little help, Composer made this possible for us - so you can have your cake and eat it too!
A deep dive into the technical building blocks of your domain model… We’ll cover Domain-Driven Design patterns like entities, value objects, repositories and domain events. Besides the basics, we’ll cover in detail different guidelines for modelling your aggregates.
All of this is called ‘tactical DDD’ and it might just turn out to be about the fundamentals of object-oriented programming too! This workshop will lead you straight to the core of programming and ways in which you can improve your applications in general.
In Onebip we developed a reporting system based on CQRS (Command Query Responsibility Segregation) and Event Sourcing using MongoDB.
In this talk I will introduce CQRS and Event Sourcing concepts, I will talk about our path and technical and conceptual challenges we faced, the strenght of our solution and the parts where there's room for improvement.
Nobody wants to work in a large ball of mud that becomes harder to manage as time goes on. Proven software architectures tells us to break the system into more manageable components that are isolated from each other.
Years back (before Composer) in symfony1 era we had a single SVN repository, that required a lot of discipline to keep our codebase decoupled and clean. After migrating to Symfony 2 we broke the project into more manageable components that were in separate Git repositories. Unfortunately it quickly became a huge overhead and nightmare to deal with.
We learned the hard why that all the benefits come from having isolated packages not breaking things into separate repositories.
Now we have a single Git repository, again. This isn't a bad idea; to my knowledge Facebook, Twitter, and Google all have a big monolithic source repos but we needed a solution that works for a lot smaller fish :)
With a little help, Composer made this possible for us - so you can have your cake and eat it too!
A deep dive into the technical building blocks of your domain model… We’ll cover Domain-Driven Design patterns like entities, value objects, repositories and domain events. Besides the basics, we’ll cover in detail different guidelines for modelling your aggregates.
All of this is called ‘tactical DDD’ and it might just turn out to be about the fundamentals of object-oriented programming too! This workshop will lead you straight to the core of programming and ways in which you can improve your applications in general.
Event Sourcing is powerful way to think about domain objects and transaction processing. Rather than persisting current state, event sourcing instead writes an immutable log of deltas to the db. Application state is derived, at any point in the past, simply by replaying the event history. Event sourcing is a deceptively radical idea which challenges our contemporary notions about transaction processing, while also being a mature pattern with a long history, used in databases, IoT and finance.
Email to Lead in 10 days - Tips from BrightTALK BrightTALK
Learn tips from BrightTALK marketer Kathryn Kilner for using email to distribute content, capturing the response and using that information to qualify leads.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/82/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/82/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
SRECon23 Cognitive Apprenticeship in Action_ Alert Triage Hour of PowerPaige Cruz
Cognitive apprenticeship is the philosophy that it is more effective to learn in context and real-world situations compared to following a tutorial in a sandboxed environment. In a nutshell it is “learning-through-guided-experience” and shines when teaching problem-solving processes experts use to handle complex tasks like say…investigating an alert by spelunking in production observability and monitoring data. Learn how Alert Triage Hour of Power became a can’t miss meeting of camaraderie and system surprises!
Two Methods for Modeling LTV with a SpreadsheetEric Seufert
NB! The bitly link in the deck DOES NOT WORK, please use this one: http://bit.ly/1JTymzd
This is the presentation I gave at Slush 2013 in Helsinki, Finland. It describes two methods for modeling Lifetime Customer Value (LTV) in Excel. Linked within the presentation is a spreadsheet exemplifying both methods against 100k rows of fake user data that I generated with a Python script to "look" real (although they probably don't).
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk ScoringSplunk
This session showcases how Splunk can be used to build a risk scoring engine designed to detect fraud and other suspicious activities. This presentation includes a real-world fraud detection use case, a detailed description of the searches and lookups, which drive risk scoring, as well as other cyber security related applications of risk scoring.
The DevOps Pay Raise: Quantifying Your Value to Move Up the Laddertlevey
DevOps, when done right, usually goes unnoticed. It's only when something breaks that all eyes turn to IT.
If your boss only sees you when the app is down, however, that's not really doing your career any favors. In this session we'll talk about how to prove your value to the organization by looking at the positive side -- that is, how much money you've saved your company.
Designing Events-First Microservices For A Cloud Native WorldLightbend
In this talk by Jonas Bonér, Lightbend CTO/Co-Founder and creator of Akka, we will explore the nature of events, what it means to be event-driven, and how we can unleash the power of events and commands by applying an events first, domain-driven design to microservices-based architectures.
For more information, head over to lightbend.com/blog!
In this webinar, we’ll discuss the benefits to establishing a meaningful dollar value, and we’ll show examples of hourly cost reports within a GRC solution.
By adding this business context, you’ll add more consistency, transparency and meaning to your BCM program, allowing you to make more effective decisions and investments.
QCon SP 2015 - Segurança em APIs RESTHeitor Vital
Mesmo com a grande quantidade de referências sobre desenvolvimento de APIs REST, os mecanismos e boas práticas de segurança ainda são pouco explorados ou inexistentes. Além disso, organizações focadas em segurança como a OWASP dedicam mais esforços a materiais relacionados à segurança de aplicações web e mobile – deixando muitas vezes em segundo plano o trabalho em segurança de sistemas baseados em APIs REST.
Nesta apresentação demonstraremos que muitas das diretivas de segurança utilizadas em aplicações web podem ser aplicadas ou adaptadas para uma arquitetura REST, incluindo proteção contra:
- Injections
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- Quebra ou bypass de mecanismos de autenticação
Por fim, discutiremos exemplos reais de falhas de segurança em famosas APIs REST e o que se pode aprender com elas.
Do More with Unified Sourcing and Supplier Engagement Scout RFP
How does “obsessing over the customer” translate to big business value? Before Scout’s inception in 2014, industry conversations exposed an overlooked, yet pivotal, business challenge for Sourcing and Procurement. Fast forward to hundreds of interviews, refined prototypes, many late nights, and over 175 customers later, now we’re onto something big. Join Scout’s co-founders for SPARK’s opening keynote as we take you on this journey to re-define the future of Strategic Sourcing.
Professional and Clean PowerPoint slides. Fully editable, perfect to impress your audience on your next presentation.
1. FULL HD Aspect Ratio: 16:9 (1900×1080)
2. Fully animated
3. Quickly, Easy and Fully Editable in PowerPoint (All Graphic Resizable and Editable)
4. Drag and Drop Images
5. Print Version Included (A4 Handouts Ready)
6. Retina Ready
7. Data charts (Editable via Excel)
8. Sync in SharePoint
9. Based on Master Slide
10. Pictures Placeholder Ready
11. PPTX and PPT Files
12. Vector icons as Shape
Note: Not need Photoshop – All Photos not included
Hdi Capital Area September 2014 Meeting Slideshdicapitalarea
New employees join your organization, only to arrive with no workstation, no user profile, and no access to critical systems. You’ve built an onboarding process, but steps are missed occasionally and it takes weeks before new employees are fully able to do the job they were hired for. Or perhaps you’ve just had a key employee leave the company to work for a competitor. Are you certain that the individual’s access to business-critical systems has been deactivated?
Companies like yours face these problems daily while trying to manually manage the acquisition and termination of employees. In many cases, companies don’t even realize they have left access to business systems open to exiting employees, exposing both the organization and its customers to risk.
I gave this presentation at Lean Kanban Asia-Pacific conference in Bangalore, India on December 11th, 2014 and at AgileDC on Washington, USA on October 21st, 2014.
I have several recent blog posts on this topic, This search link should get most of them: http://connected-knowledge.com/?s=lead+time. If you need one "best" post, here it is, Inside a Lead Time Distribution: http://connected-knowledge.com/2014/09/07/inside-lead-time-distribution/
Event Sourcing is powerful way to think about domain objects and transaction processing. Rather than persisting current state, event sourcing instead writes an immutable log of deltas to the db. Application state is derived, at any point in the past, simply by replaying the event history. Event sourcing is a deceptively radical idea which challenges our contemporary notions about transaction processing, while also being a mature pattern with a long history, used in databases, IoT and finance.
Email to Lead in 10 days - Tips from BrightTALK BrightTALK
Learn tips from BrightTALK marketer Kathryn Kilner for using email to distribute content, capturing the response and using that information to qualify leads.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/82/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/82/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
SRECon23 Cognitive Apprenticeship in Action_ Alert Triage Hour of PowerPaige Cruz
Cognitive apprenticeship is the philosophy that it is more effective to learn in context and real-world situations compared to following a tutorial in a sandboxed environment. In a nutshell it is “learning-through-guided-experience” and shines when teaching problem-solving processes experts use to handle complex tasks like say…investigating an alert by spelunking in production observability and monitoring data. Learn how Alert Triage Hour of Power became a can’t miss meeting of camaraderie and system surprises!
Two Methods for Modeling LTV with a SpreadsheetEric Seufert
NB! The bitly link in the deck DOES NOT WORK, please use this one: http://bit.ly/1JTymzd
This is the presentation I gave at Slush 2013 in Helsinki, Finland. It describes two methods for modeling Lifetime Customer Value (LTV) in Excel. Linked within the presentation is a spreadsheet exemplifying both methods against 100k rows of fake user data that I generated with a Python script to "look" real (although they probably don't).
Splunk conf2014 - Detecting Fraud and Suspicious Events Using Risk ScoringSplunk
This session showcases how Splunk can be used to build a risk scoring engine designed to detect fraud and other suspicious activities. This presentation includes a real-world fraud detection use case, a detailed description of the searches and lookups, which drive risk scoring, as well as other cyber security related applications of risk scoring.
The DevOps Pay Raise: Quantifying Your Value to Move Up the Laddertlevey
DevOps, when done right, usually goes unnoticed. It's only when something breaks that all eyes turn to IT.
If your boss only sees you when the app is down, however, that's not really doing your career any favors. In this session we'll talk about how to prove your value to the organization by looking at the positive side -- that is, how much money you've saved your company.
Designing Events-First Microservices For A Cloud Native WorldLightbend
In this talk by Jonas Bonér, Lightbend CTO/Co-Founder and creator of Akka, we will explore the nature of events, what it means to be event-driven, and how we can unleash the power of events and commands by applying an events first, domain-driven design to microservices-based architectures.
For more information, head over to lightbend.com/blog!
In this webinar, we’ll discuss the benefits to establishing a meaningful dollar value, and we’ll show examples of hourly cost reports within a GRC solution.
By adding this business context, you’ll add more consistency, transparency and meaning to your BCM program, allowing you to make more effective decisions and investments.
QCon SP 2015 - Segurança em APIs RESTHeitor Vital
Mesmo com a grande quantidade de referências sobre desenvolvimento de APIs REST, os mecanismos e boas práticas de segurança ainda são pouco explorados ou inexistentes. Além disso, organizações focadas em segurança como a OWASP dedicam mais esforços a materiais relacionados à segurança de aplicações web e mobile – deixando muitas vezes em segundo plano o trabalho em segurança de sistemas baseados em APIs REST.
Nesta apresentação demonstraremos que muitas das diretivas de segurança utilizadas em aplicações web podem ser aplicadas ou adaptadas para uma arquitetura REST, incluindo proteção contra:
- Injections
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- Quebra ou bypass de mecanismos de autenticação
Por fim, discutiremos exemplos reais de falhas de segurança em famosas APIs REST e o que se pode aprender com elas.
Do More with Unified Sourcing and Supplier Engagement Scout RFP
How does “obsessing over the customer” translate to big business value? Before Scout’s inception in 2014, industry conversations exposed an overlooked, yet pivotal, business challenge for Sourcing and Procurement. Fast forward to hundreds of interviews, refined prototypes, many late nights, and over 175 customers later, now we’re onto something big. Join Scout’s co-founders for SPARK’s opening keynote as we take you on this journey to re-define the future of Strategic Sourcing.
Professional and Clean PowerPoint slides. Fully editable, perfect to impress your audience on your next presentation.
1. FULL HD Aspect Ratio: 16:9 (1900×1080)
2. Fully animated
3. Quickly, Easy and Fully Editable in PowerPoint (All Graphic Resizable and Editable)
4. Drag and Drop Images
5. Print Version Included (A4 Handouts Ready)
6. Retina Ready
7. Data charts (Editable via Excel)
8. Sync in SharePoint
9. Based on Master Slide
10. Pictures Placeholder Ready
11. PPTX and PPT Files
12. Vector icons as Shape
Note: Not need Photoshop – All Photos not included
Hdi Capital Area September 2014 Meeting Slideshdicapitalarea
New employees join your organization, only to arrive with no workstation, no user profile, and no access to critical systems. You’ve built an onboarding process, but steps are missed occasionally and it takes weeks before new employees are fully able to do the job they were hired for. Or perhaps you’ve just had a key employee leave the company to work for a competitor. Are you certain that the individual’s access to business-critical systems has been deactivated?
Companies like yours face these problems daily while trying to manually manage the acquisition and termination of employees. In many cases, companies don’t even realize they have left access to business systems open to exiting employees, exposing both the organization and its customers to risk.
I gave this presentation at Lean Kanban Asia-Pacific conference in Bangalore, India on December 11th, 2014 and at AgileDC on Washington, USA on October 21st, 2014.
I have several recent blog posts on this topic, This search link should get most of them: http://connected-knowledge.com/?s=lead+time. If you need one "best" post, here it is, Inside a Lead Time Distribution: http://connected-knowledge.com/2014/09/07/inside-lead-time-distribution/
Similar to Big Data Day LA 2015 - Event Sourcing: The Best Ubiquitous Pattern You've Never Heard Of by Bryan Reneiro of MongoDB (20)
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA
Mike Limcaco, Analytics Specialist / Customer Engineer at Google
Measure trends in a particular topic or search term across Google Search across the US down to the city-level. Integrate these data signals into analytic pipelines to drive product, retail, media (video, audio, digital content) recommendations tailored to your audience segment. We'll discuss how Google unique datasets can be used with Google Cloud smart analytic services to process, enrich and surface the most relevant product or content that matches the ever-changing interests of your local customer segment.
Melinda Thielbar, Data Science Practice Lead and Director of Data Science at Fidelity Investments
From corporations to governments to private individuals, most of the AI community has recognized the growing need to incorporate ethics into the development and maintenance of AI models. Much of the current discussion, though, is meant for leaders and managers. This talk is directed to data scientists, data engineers, ML Ops specialists, and anyone else who is responsible for the hands-on, day-to-day of work building, productionalizing, and maintaining AI models. We'll give a short overview of the business case for why technical AI expertise is critical to developing an AI Ethics strategy. Then we'll discuss the technical problems that cause AI models to behave unethically, how to detect problems at all phases of model development, and the tools and techniques that are available to support technical teams in Ethical AI development.
Data Con LA 2022 - Improving disaster response with machine learningData Con LA
Antje Barth, Principal Developer Advocate, AI/ML at AWS & Chris Fregly, Principal Engineer, AI & ML at AWS
The frequency and severity of natural disasters are increasing. In response, governments, businesses, nonprofits, and international organizations are placing more emphasis on disaster preparedness and response. Many organizations are accelerating their efforts to make their data publicly available for others to use. Repositories such as the Registry of Open Data on AWS and Humanitarian Data Exchange contain troves of data available for use by developers, data scientists, and machine learning practitioners. In this session, see how a community of developers came together though the AWS Disaster Response hackathon to build models to support natural disaster preparedness and response.
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA
Sig Narvaez, Executive Solution Architect at MongoDB
MongoDB is now a Developer Data Platform. Come learn what�s new in the 6.0 release and Atlas following all the recent announcements made at MongoDB World 2022. Topics will include
- Atlas Search which combines 3 systems into one (database, search engine, and sync mechanisms) letting you focus on your product's differentiation.
- Atlas Data Federation to seamlessly query, transform, and aggregate data from one or more MongoDB Atlas databases, Atlas Data Lake and AWS S3 buckets
- Queryable Encryption lets you run expressive queries on fully randomized encrypted data to meet the most stringent security requirements
- Relational Migrator which analyzes your existing relational schemas and helps you design a new MongoDB schema.
- And more!
Data Con LA 2022 - Real world consumer segmentationData Con LA
Jaysen Gillespie, Head of Analytics and Data Science at RTB House
1. Shopkick has over 30M downloads, but the userbase is very heterogeneous. Anecdotal evidence indicated a wide variety of users for whom the app holds long-term appeal.
2. Marketing and other teams challenged Analytics to get beyond basic summary statistics and develop a holistic segmentation of the userbase.
3. Shopkick's data science team used SQL and python to gather data, clean data, and then perform a data-driven segmentation using a k-means algorithm.
4. Interpreting the results is more work -- and more fun -- than running the algo itself. We'll discuss how we transform from ""segment 1"", ""segment 2"", etc. to something that non-analytics users (Marketing, Operations, etc.) could actually benefit from.
5. So what? How did team across Shopkick change their approach given what Analytics had discovered.
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA
Ravi Pillala, Chief Data Architect & Distinguished Engineer at Intuit
TurboTax is one of the well known consumer software brand which at its peak serves 385K+ concurrent users. In this session, We start with looking at how user behavioral data & tax domain events are captured in real time using the event bus and analyzed to drive real time personalization with various TurboTax data pipelines. We will also look at solutions performing analytics which make use of these events, with the help of Kafka, Apache Flink, Apache Beam, Spark, Amazon S3, Amazon EMR, Redshift, Athena and Amazon lambda functions. Finally, we look at how SageMaker is used to create the TurboTax model to predict if a customer is at risk or needs help.
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA
George Mansoor, Chief Information Systems Officer at California State University
Overview of the CSU Data Architecture on moving on-prem ERP data to the AWS Cloud at scale using Delphix for Data Replication/Virtualization and AWS Data Migration Service (DMS) for data extracts
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA
Anand Ranganathan, Chief AI Officer at Unscrambl
Conversational AI is getting more and more widely used for customer support and employee support use-cases. In this session, I'm going to talk about how it can be extended for data analysis and data science use-cases ... i.e., how users can interact with a bot to ask analytical questions on data in relational databases.
This allows users to explore complex datasets using a combination of text and voice questions, in natural language, and then get back results in a combination of natural language and visualizations. Furthermore, it allows collaborative exploration of data by a group of users in a channel in platforms like Microsoft Teams, Slack or Google Chat.
For example, a group of users in a channel can ask questions to a bot in plain English like ""How many cases of Covid were there in the last 2 months by state and gender"" or ""Why did the number of deaths from Covid increase in May 2022"", and jointly look at the results that come back. This facilitates data awareness, data-driven collaboration and joint decision making among teams in enterprises and outside.
In this talk, I'll describe how we can bring together various features including natural-language understanding, NL-to-SQL translation, dialog management, data story-telling, semantic modeling of data and augmented analytics to facilitate collaborate exploration of data using conversational AI.
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA
Anil Inamdar, VP & Head of Data Solutions at Instaclustr
The most modernized enterprises utilize polyglot architecture, applying the best-suited database technologies to each of their organization's particular use cases. To successfully implement such an architecture, though, you need a thorough knowledge of the expansive NoSQL data technologies now available.
Attendees of this Data Con LA presentation will come away with:
-- A solid understanding of the decision-making process that should go into vetting NoSQL technologies and how to plan out their data modernization initiatives and migrations.
-- They will learn the types of functionality that best match the strengths of NoSQL key-value stores, graph databases, columnar databases, document-type databases, time-series databases, and more.
-- Attendees will also understand how to navigate database technology licensing concerns, and to recognize the types of vendors they'll encounter across the NoSQL ecosystem. This includes sniffing out open-core vendors that may advertise as “open source,"" but are driven by a business model that hinges on achieving proprietary lock-in.
-- Attendees will also learn to determine if vendors offer open-code solutions that apply restrictive licensing, or if they support true open source technologies like Hadoop, Cassandra, Kafka, OpenSearch, Redis, Spark, and many more that offer total portability and true freedom of use.
Data Con LA 2022 - Intro to Data ScienceData Con LA
Zia Khan, Computer Systems Analyst and Data Scientist at LearningFuze
Data Science tutorial is designed for people who are new to Data Science. This is a beginner level session so no prior coding or technical knowledge is required. Just bring your laptop with WiFi capability. The session starts with a review of what is data science, the amount of data we generate and how companies are using that data to get insight. We will pick a business use case, define the data science process, followed by hands-on lab using python and Jupyter notebook. During the hands-on portion we will work with pandas, numpy, matplotlib and sklearn modules and use a machine learning algorithm to approach the business use case.
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA
Mariana Danilovic, Managing Director at Infiom, LLC
We will address:
(1) Community creation and engagement using tokens and NFTs
(2) Organization of DAO structures and ways to incentivize Web3 communities
(3) DeFi business models applied to Web3 ventures
(4) Why Metaverse matters for new entertainment and community engagement models.
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA
Curtis ODell, Global Director Data Integrity at Tricentis
Join me to learn about a new end-to-end data testing approach designed for modern data pipelines that fills dangerous gaps left by traditional data management tools—one designed to handle structured and unstructured data from any source. You'll hear how you can use unique automation technology to reach up to 90 percent test coverage rates and deliver trustworthy analytical and operational data at scale. Several real world use cases from major banks/finance, insurance, health analytics, and Snowflake examples will be presented.
Key Learning Objective
1. Data journeys are complex and you have to ensure integrity of the data end to end across this journey from source to end reporting for compliance
2. Data Management tools do not test data, they profile and monitor at best, and leave serious gaps in your data testing coverage
3. Automation with integration to DevOps and DataOps' CI/CD processes are key to solving this.
4. How this approach has impact in your vertical
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA
Arif Ansari, Professor at University of Southern California
Super Bowl Ad cost $7 million and each year a few Super Bowl ads go viral. The traditional A/B testing does not predict virality. Some highly shared ones reach over 60 million organic views, which can be more valuable than views on TV. Not only are these voluntary, but they are typically without distraction, and win viewer engagement in the form of likes, comments, or shares. A Super Bowl ad that wins 69 million views on YouTube (e.g., Alexa Mind Reader) costs less than 10 cents per quality view! However, the challenge is triggering virality. We developed a method to predict virality and engineer virality into Ads.
1. Prof. Gerard J. Tellis and co-authors recommended that advertisers use YouTube to tease, test, and tweak (TTT) their ads to maximize sharing and viewing. 2022 saw that maxim put into practice.
2. We developed viral Ads prediction using two scientific models:
a. Prof. Gerard Tellis et al.'s model for viral prediction
b. Deep Learning viral prediction using social media effect
3. The model was able to identify all the top 15 Viral Ads it performed better than the traditional agencies.
4. New proposed method is Tease, Test, Tweak, Target and Spots Ad.
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA
Jai Bansal, Senior Manager, Data Science at Aetna
This talk describes an internal data product called Member Embeddings that facilitates modeling of member medical journeys with machine learning.
Medical claims are the key data source we use to understand health journeys at Aetna. Claims are the data artifacts that result from our members' interactions with the healthcare system. Claims contain data like the amount the provider billed, the place of service, and provider specialty. The primary medical information in a claim is represented in codes that indicate the diagnoses, procedures, or drugs for which a member was billed. These codes give us a semi-structured view into the medical reason for each claim and so contain rich information about members' health journeys. However, since the codes themselves are categorical and high-dimensional (10K cardinality), it's challenging to extract insight or predictive power directly from the raw codes on a claim.
To transform claim codes into a more useful format for machine learning, we turned to the concept of embeddings. Word embeddings are widely used in natural language processing to provide numeric vector representations of individual words.
We use a similar approach with our claims data. We treat each claim code as a word or token and use embedding algorithms to learn lower-dimensional vector representations that preserve the original high-dimensional semantic meaning.
This process converts the categorical features into dense numeric representations. In our case, we use sequences of anonymized member claim diagnosis, procedure, and drug codes as training data. We tested a variety of algorithms to learn embeddings for each type of claim code.
We found that the trained embeddings showed relationships between codes that were reasonable from the point of view of subject matter experts. In addition, using the embeddings to predict future healthcare-related events outperformed other basic features, making this tool an easy way to improve predictive model performance and save data scientist time.
Data Con LA 2022 - Data Streaming with KafkaData Con LA
Jie Chen, Manager Advisory, KPMG
Data is the new oil. However, many organizations have fragmented data in siloed line of businesses. In this topic, we will focus on identifying the legacy patterns and their limitations and introducing the new patterns packed by Kafka's core design ideas. The goal is to tirelessly pursue better solutions for organizations to overcome the bottleneck in data pipelines and modernize the digital assets for ready to scale their businesses. In summary, we will walk through three uses cases, recommend Dos and Donts, Take aways for Data Engineers, Data Scientist, Data architect in developing forefront data oriented skills.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.