We provide you an experienced DPO on a cost-effective basis, as allowed by GDPR. Our data protection services are available anytime ask for guidance and reassurance
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
The document summarizes key points from a presentation on legal and regulatory privacy challenges for the financial services sector. It discusses the EU Data Protection Directive and definitions of personal data. It also outlines current challenges such as international data transfers and incident response across jurisdictions. The presentation provides recommendations for demonstrating global compliance, including understanding applicable standards and prioritizing risks through tools like questionnaires.
The EU ePrivacy Directive - Navigating the UK Cookie LawSilverpop
This webinar provided an overview of the EU ePrivacy Directive and recommendations for marketers to achieve compliance. It discussed auditing all cookies used on websites, assessing non-essential cookies, obtaining opt-in consent for cookies, maintaining records of consent, and including full cookie descriptions in privacy policies. Experts from IMRG and Silverpop explained the Directive's requirements and answered questions. Silverpop also shared additional resources on their website to help marketers understand and implement the Directive.
The document discusses several key legal issues related to cloud computing:
1) Determining who is responsible for data protection compliance as the roles of data controller and processor can be ambiguous in cloud environments.
2) Security requirements for cloud providers and whether customers can fully delegate security obligations. Certifications like ISO 27001 are discussed.
3) Cross-border data transfer issues and ensuring personal data stays within adequate jurisdictions according to the EU Data Protection Directive. Transfers to third countries require mechanisms like Safe Harbor, model contracts, or self-assessments.
This document summarizes key aspects of data protection regulations including the transition from the Data Protection Directive (DPD) to the General Data Protection Regulation (GDPR). It discusses definitions of personal data and health data, requirements around anonymization and pseudonymization, consent requirements, research data protections, data transfer and security rules, and new obligations to notify authorities of data breaches. The presentation concludes with contact information for Sofie van der Meulen of Axon Advocaten law firm in Amsterdam.
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
Due to an increase in the collection of consumer data, high-profile data breaches have become common.
Currently, there are 128 countries all over the world that have already put in place regulations to secure the protection of data and privacy.
The webinar covers:
Data protection, a global development
Introduction to the GDPR, ePrivacy & ISO/IEC 27701
GDPR & ISO/IEC 27701mapping
ePrivacy & ISO/IEC 27701 mapping
Recorded Webinar: https://youtu.be/oVhIoHAGGwk
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
PECB Webinar: The End of Safe Harbour! What happens Next?PECB
The webinar covers:
• What is Safe Harbour, and how companies were relied on it
• How the end of it will affect US firms
• What will happen next
• How companies will react
• The implications of this act
• What is the solution to this
Presenter:
This session was hosted by Mr. Graeme Parker, Managing Director of Parker Solutions Group, a PECB representative in UK. Mr. Parker has more than 20 years of experience in information security, and data privacy, and was also involved with many companies that were relied on Safe Harbour.
Link of the recorded session published on YouTube: https://youtu.be/cbPUTVtxem0
General Data Protection Regulation (GDPR) Karina Matos
This document summarizes Microsoft's approach to privacy and data protection. It discusses Microsoft's privacy principles of transparency, security, compliance and privacy. It outlines Microsoft's privacy governance structure and investments in cybersecurity. It also discusses Microsoft's efforts to comply with privacy regulations like GDPR and respect for data subject rights and privacy by design.
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
The document summarizes key points from a presentation on legal and regulatory privacy challenges for the financial services sector. It discusses the EU Data Protection Directive and definitions of personal data. It also outlines current challenges such as international data transfers and incident response across jurisdictions. The presentation provides recommendations for demonstrating global compliance, including understanding applicable standards and prioritizing risks through tools like questionnaires.
The EU ePrivacy Directive - Navigating the UK Cookie LawSilverpop
This webinar provided an overview of the EU ePrivacy Directive and recommendations for marketers to achieve compliance. It discussed auditing all cookies used on websites, assessing non-essential cookies, obtaining opt-in consent for cookies, maintaining records of consent, and including full cookie descriptions in privacy policies. Experts from IMRG and Silverpop explained the Directive's requirements and answered questions. Silverpop also shared additional resources on their website to help marketers understand and implement the Directive.
The document discusses several key legal issues related to cloud computing:
1) Determining who is responsible for data protection compliance as the roles of data controller and processor can be ambiguous in cloud environments.
2) Security requirements for cloud providers and whether customers can fully delegate security obligations. Certifications like ISO 27001 are discussed.
3) Cross-border data transfer issues and ensuring personal data stays within adequate jurisdictions according to the EU Data Protection Directive. Transfers to third countries require mechanisms like Safe Harbor, model contracts, or self-assessments.
This document summarizes key aspects of data protection regulations including the transition from the Data Protection Directive (DPD) to the General Data Protection Regulation (GDPR). It discusses definitions of personal data and health data, requirements around anonymization and pseudonymization, consent requirements, research data protections, data transfer and security rules, and new obligations to notify authorities of data breaches. The presentation concludes with contact information for Sofie van der Meulen of Axon Advocaten law firm in Amsterdam.
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
Due to an increase in the collection of consumer data, high-profile data breaches have become common.
Currently, there are 128 countries all over the world that have already put in place regulations to secure the protection of data and privacy.
The webinar covers:
Data protection, a global development
Introduction to the GDPR, ePrivacy & ISO/IEC 27701
GDPR & ISO/IEC 27701mapping
ePrivacy & ISO/IEC 27701 mapping
Recorded Webinar: https://youtu.be/oVhIoHAGGwk
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
PECB Webinar: The End of Safe Harbour! What happens Next?PECB
The webinar covers:
• What is Safe Harbour, and how companies were relied on it
• How the end of it will affect US firms
• What will happen next
• How companies will react
• The implications of this act
• What is the solution to this
Presenter:
This session was hosted by Mr. Graeme Parker, Managing Director of Parker Solutions Group, a PECB representative in UK. Mr. Parker has more than 20 years of experience in information security, and data privacy, and was also involved with many companies that were relied on Safe Harbour.
Link of the recorded session published on YouTube: https://youtu.be/cbPUTVtxem0
General Data Protection Regulation (GDPR) Karina Matos
This document summarizes Microsoft's approach to privacy and data protection. It discusses Microsoft's privacy principles of transparency, security, compliance and privacy. It outlines Microsoft's privacy governance structure and investments in cybersecurity. It also discusses Microsoft's efforts to comply with privacy regulations like GDPR and respect for data subject rights and privacy by design.
The document discusses ISO 28000:2007, a supply chain security management system standard. It provides an overview of the standard, outlining its purpose to protect people, property, information and infrastructure in supply chains. Key steps and elements for implementing an ISO 28000:2007 system are described, including risk assessment, security controls, objectives, training and audits. Benefits of certification include integrated resilience, improved compliance and performance. The company Lakshy Management Consultant Pvt. Ltd. is introduced as providing consulting services to achieve ISO 28000 certification.
ISO/TS 29001:2010 defines the quality management system requirements for the design, development, production, installation and service of products for the petroleum, petrochemical and natural gas industries.
ISO/IEC 27032 – Guidelines For Cyber SecurityTharindunuwan9
ISO/IEC 27032 provides guidelines for cybersecurity and defines cyberspace as the interaction of people, software, and technology services globally. It aims to emphasize the role of security across information, networks, the internet, and critical infrastructure. The standard establishes a framework for trust, collaboration, information sharing, and technical integration between stakeholders in cyberspace.
With all of the acronyms and numbers, it is challenging to determine what is what in the world of cyber security and compliance.
In the government space, the National Institute of Standards (NIST) has been the key body for identifying and determining standards related to protecting critical infrastructure and government data.
Participants will walk away more conversant in the alphabet soup of NIST requirements and how they apply to these various programs.
This presentation:
• Provides a deep dive in the the similarities and differences between standards such as NIST 800-53, 800-171, and frameworks such as the cybersecurity framework
• How these standards and frameworks apply to FedRAMP, CJIS, and very specific programs covering data like the Death Master File (DMF)
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
GDPR is Coming, May 25 2018 brings a whole new order of EU Personal Data Privacy and Protection rights, duties and obligations. What changes, what's your risk and how can you start to prepare?
How can a Unified Governance strategy and capabilities transform both your information governance program, and provide a framework for personal data?
How that strategy can leverage metadata to support and accelerate meeting regulatory issues.
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB
New data protection regulations have significantly impacted the way that businesses collect, store, and handle clients’ personal information.
Considering the continuously increasing importance of data protection and privacy in today’s world, businesses should be up to speed with their data privacy policies and procedures.
The webinar covers:
1. ISO/IEC 27001 – Information Security Framework Key requirements under CCPA, CPRA, GDPR
• ISO/IEC 27005 – Information Security Risk Management
• ISO/IEC 27035 – Information Security Incident Management
• ISO/IEC 22301 & 27031 - Business Continuity Management (BCM)
2. Alternative Frameworks
• CMMC - Cybersecurity Maturity Model Certification
• NIST CSF Cybersecurity Framework
• ISO/IEC 27032 – Guidelines for Cybersecurity
3. Supplier Management
Date: April 21, 2021
Recorded Webinar: https://youtu.be/bi3tvvhGV1s
The Virtual Security Officer Platform automates common security tasks like defining security plans, implementing controls, and demonstrating compliance to simplify passing audits and staying secure. It uses a world-class GRC platform and leverages over 300 combined years of security expertise. FixNix++ offers advisory, strategy, compliance, and technology services to help enterprises streamline their security programs and gain customer trust.
This document provides an overview of Sarwono Sutikno's presentation on information security management systems (ISMS) based on ISO/IEC 27000 standards. The presentation covers:
1. Sutikno's background and qualifications in information security, including certifications.
2. An overview of the ISO/IEC 27000 family of standards for developing and implementing an ISMS framework to manage security of information assets.
3. Key concepts in ISMS including the importance of managing risks to information assets, adopting the process approach, and establishing an ISMS to achieve security objectives.
This document outlines an engagement between a client company and we45 to implement the ISO 27001 standard across the client's 9 locations. It describes the pre-engagement situation where the client lacked standardized IT procedures and information security awareness. we45 proposed conducting risk assessments, amending policies and procedures, implementing controls, and performing an internal audit. This resulted in the client achieving ISO 27001 certification across all locations and improved information security management.
ISO 27001 Information Security Management Systems Trends and DevelopmentsCertification Europe
Michael Brophy's ISO 27001 Information Security Management Systems Trends and Developments presentation. The presentation was delivered at our Information Security Breakfast Seminar (Nov 2011)
This document summarizes several information management system standards including ISO 9001, ISO 27001, ISO 20000-1, and ISO 22301. It provides an overview of the benefits of certification, including improved quality, risk management, and gaining customer trust. It also describes the focus and key requirements of each standard, and recommends which ones would be most suitable for different company sizes and industries depending on their needs around quality management, information security, IT service management, and business continuity.
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
The General Data Protection Regulation (GDPR) came into effect on May 25th 2018 and organisations and data subjects alike are mostly in the dark about what it means and how it affects them This is a summary of the regulation and how businesses can leverage the implementation of international standards such as ISO 27001 to meet the requirements of the regulation.
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
ISO 27001 Implementation Taining done by Industry Experts,customized for you & connected with relevance to your Industry, products, services & Processes
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
ISO 27001 Internal Auditor Taining is done by Industry Experts, customized for you & connected with relevance to your Industry, products, services & Processes
Total Digital Security Introduction 4.2Brad Deflin
Brad Deflin founded Total Digital Security to provide cyber security as a service through cloud-based solutions to protect individuals, families, and businesses from growing cyber threats. The document discusses how trends like increased mobile computing, big data, digital currencies, the internet of things, and the convergence of cyber and physical crime have expanded cyber risks for all. Total Digital Security offers state-of-the-art security solutions that work automatically across devices and locations to mitigate these risks through services like endpoint protection, online security, private email/domains, and secure data storage.
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
This webinar illustrates:
- An overview of the GDPR
- How an ISO 27001-aligned ISMS can support GDPR compliance
- The top risks that result in data breaches
- The benefits of implementing an ISMS
- The technical and organisational requirements to achieve GDPR compliance
- How to improve your overall information security in line with the GDPR’s requirements
A recording of the webinar can be found here: https://www.youtube.com/watch?v=s7XQwBQ6JMg
Extended version of PECB Webinar of 15/oct/2020
Base version here:
https://www.slideshare.net/PECBCERTIFICATION/isoiec-27701-vs-isoiec-27001-vs-nist-essential-things-you-need-to-know
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
The document discusses ISO 28000:2007, a supply chain security management system standard. It provides an overview of the standard, outlining its purpose to protect people, property, information and infrastructure in supply chains. Key steps and elements for implementing an ISO 28000:2007 system are described, including risk assessment, security controls, objectives, training and audits. Benefits of certification include integrated resilience, improved compliance and performance. The company Lakshy Management Consultant Pvt. Ltd. is introduced as providing consulting services to achieve ISO 28000 certification.
ISO/TS 29001:2010 defines the quality management system requirements for the design, development, production, installation and service of products for the petroleum, petrochemical and natural gas industries.
ISO/IEC 27032 – Guidelines For Cyber SecurityTharindunuwan9
ISO/IEC 27032 provides guidelines for cybersecurity and defines cyberspace as the interaction of people, software, and technology services globally. It aims to emphasize the role of security across information, networks, the internet, and critical infrastructure. The standard establishes a framework for trust, collaboration, information sharing, and technical integration between stakeholders in cyberspace.
With all of the acronyms and numbers, it is challenging to determine what is what in the world of cyber security and compliance.
In the government space, the National Institute of Standards (NIST) has been the key body for identifying and determining standards related to protecting critical infrastructure and government data.
Participants will walk away more conversant in the alphabet soup of NIST requirements and how they apply to these various programs.
This presentation:
• Provides a deep dive in the the similarities and differences between standards such as NIST 800-53, 800-171, and frameworks such as the cybersecurity framework
• How these standards and frameworks apply to FedRAMP, CJIS, and very specific programs covering data like the Death Master File (DMF)
Richard Hogg & Dennis Waldron - #InfoGov17 - Cognitive Unified Governance & P...ARMA International
GDPR is Coming, May 25 2018 brings a whole new order of EU Personal Data Privacy and Protection rights, duties and obligations. What changes, what's your risk and how can you start to prepare?
How can a Unified Governance strategy and capabilities transform both your information governance program, and provide a framework for personal data?
How that strategy can leverage metadata to support and accelerate meeting regulatory issues.
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB
New data protection regulations have significantly impacted the way that businesses collect, store, and handle clients’ personal information.
Considering the continuously increasing importance of data protection and privacy in today’s world, businesses should be up to speed with their data privacy policies and procedures.
The webinar covers:
1. ISO/IEC 27001 – Information Security Framework Key requirements under CCPA, CPRA, GDPR
• ISO/IEC 27005 – Information Security Risk Management
• ISO/IEC 27035 – Information Security Incident Management
• ISO/IEC 22301 & 27031 - Business Continuity Management (BCM)
2. Alternative Frameworks
• CMMC - Cybersecurity Maturity Model Certification
• NIST CSF Cybersecurity Framework
• ISO/IEC 27032 – Guidelines for Cybersecurity
3. Supplier Management
Date: April 21, 2021
Recorded Webinar: https://youtu.be/bi3tvvhGV1s
The Virtual Security Officer Platform automates common security tasks like defining security plans, implementing controls, and demonstrating compliance to simplify passing audits and staying secure. It uses a world-class GRC platform and leverages over 300 combined years of security expertise. FixNix++ offers advisory, strategy, compliance, and technology services to help enterprises streamline their security programs and gain customer trust.
This document provides an overview of Sarwono Sutikno's presentation on information security management systems (ISMS) based on ISO/IEC 27000 standards. The presentation covers:
1. Sutikno's background and qualifications in information security, including certifications.
2. An overview of the ISO/IEC 27000 family of standards for developing and implementing an ISMS framework to manage security of information assets.
3. Key concepts in ISMS including the importance of managing risks to information assets, adopting the process approach, and establishing an ISMS to achieve security objectives.
This document outlines an engagement between a client company and we45 to implement the ISO 27001 standard across the client's 9 locations. It describes the pre-engagement situation where the client lacked standardized IT procedures and information security awareness. we45 proposed conducting risk assessments, amending policies and procedures, implementing controls, and performing an internal audit. This resulted in the client achieving ISO 27001 certification across all locations and improved information security management.
ISO 27001 Information Security Management Systems Trends and DevelopmentsCertification Europe
Michael Brophy's ISO 27001 Information Security Management Systems Trends and Developments presentation. The presentation was delivered at our Information Security Breakfast Seminar (Nov 2011)
This document summarizes several information management system standards including ISO 9001, ISO 27001, ISO 20000-1, and ISO 22301. It provides an overview of the benefits of certification, including improved quality, risk management, and gaining customer trust. It also describes the focus and key requirements of each standard, and recommends which ones would be most suitable for different company sizes and industries depending on their needs around quality management, information security, IT service management, and business continuity.
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
The General Data Protection Regulation (GDPR) came into effect on May 25th 2018 and organisations and data subjects alike are mostly in the dark about what it means and how it affects them This is a summary of the regulation and how businesses can leverage the implementation of international standards such as ISO 27001 to meet the requirements of the regulation.
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
ISO 27001 Implementation Taining done by Industry Experts,customized for you & connected with relevance to your Industry, products, services & Processes
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
ISO 27001 Internal Auditor Taining is done by Industry Experts, customized for you & connected with relevance to your Industry, products, services & Processes
Total Digital Security Introduction 4.2Brad Deflin
Brad Deflin founded Total Digital Security to provide cyber security as a service through cloud-based solutions to protect individuals, families, and businesses from growing cyber threats. The document discusses how trends like increased mobile computing, big data, digital currencies, the internet of things, and the convergence of cyber and physical crime have expanded cyber risks for all. Total Digital Security offers state-of-the-art security solutions that work automatically across devices and locations to mitigate these risks through services like endpoint protection, online security, private email/domains, and secure data storage.
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
This webinar illustrates:
- An overview of the GDPR
- How an ISO 27001-aligned ISMS can support GDPR compliance
- The top risks that result in data breaches
- The benefits of implementing an ISMS
- The technical and organisational requirements to achieve GDPR compliance
- How to improve your overall information security in line with the GDPR’s requirements
A recording of the webinar can be found here: https://www.youtube.com/watch?v=s7XQwBQ6JMg
Extended version of PECB Webinar of 15/oct/2020
Base version here:
https://www.slideshare.net/PECBCERTIFICATION/isoiec-27701-vs-isoiec-27001-vs-nist-essential-things-you-need-to-know
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
2. We provide you an
experienced DPO on a cost-
effective basis, as allowed by
GDPR. Our data protection
services are available anytime
ask for guidance and
reassurance.
3. Data Protection Impact Assessment
DPIA is the project that processes personal
data which identify and minimize the data
protection risk. DPIA has been recommended
by the Information Commissioner’s Officer. Any
New IT system and business process that
contains a high risk of the data subject that
requires a data protection impact assessment.
4. GDPR Services and Plans
Consulting Packages
GDPR website compliances
Data protection impact assessment
GDPR audits
Data protection officer
GDPR training and awareness