This presentation details a way for banks and financial institutions to regain their ability to work with data safely and efficiently. It shows how privacy-preserving synthetic data helps enterprises gain agility in data operations while complying with the financial industry's data constraints.
Big Data, Trends,opportunities and some case studies( Mahmoud Khosravi)Mahmood Khosravi
Humans have been generating data for thousands of years. More recently we have seen
an amazing progression in the amount of data produced from the advent of mainframes
to client server to ERP and now everything digital. For years the overwhelming amount
of data produced was deemed useless
Data Analytics has become a powerful tool to drive corporates and businesses. check out this 6 Reasons to Use Data Analytics. Visit: https://www.raybiztech.com/blog/data-analytics/6-reasons-to-use-data-analytics
Big Data, Trends,opportunities and some case studies( Mahmoud Khosravi)Mahmood Khosravi
Humans have been generating data for thousands of years. More recently we have seen
an amazing progression in the amount of data produced from the advent of mainframes
to client server to ERP and now everything digital. For years the overwhelming amount
of data produced was deemed useless
Data Analytics has become a powerful tool to drive corporates and businesses. check out this 6 Reasons to Use Data Analytics. Visit: https://www.raybiztech.com/blog/data-analytics/6-reasons-to-use-data-analytics
Presented by Reto Cavegn at the 4th meeting: We would like to present IBM's view on BigData, what the market is requiring, and what products and strategies are evolved out of this requirements. Futher, we will present some reference projects to show, on what use cases customers are working today and what challanges our customers try to solve with BigData. Let me round up with some challenges and lessons we have learned.
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Denodo
Watch full webinar here: https://bit.ly/3szm3PV
In the digital transformation era, banks need a single view of all their data and a way to establish security controls across the entire infrastructure. This can be achieved with Data Virtualization.
Banking institutions need to update their legacy systems and implement strategies and services that will transform them into digital financial organizations.
They need agile access to information that can be leveraged to make timely business decisions, yet still fulfill the regulatory requirements. In the digital transformation era, banks need a single view of all their data and a way to establish security controls across the entire infrastructure.
This webinar presents:
- How data virtualization can help update and modernize data architectures,
- Success stories of financial companies that already use this technology to differentiate themselves from the competition, optimize processes, and create new business opportunities through more agile data management.
What is Big Data?
Big Data Laws
Why Big Data?
Industries using Big Data
Current process/SW in SCM
Challenges in SCM industry
How Big data can solve the problems?
Migration to Big data for an SCM industry
You probably have heard about Big Data, but ever wondered what it exactly is? And why should you care?
Mobile is playing a large part in driving this explosion in data. The data are also created by the apps and other services in the background. As people are moving towards more digital channels, tons of data are being created. This data can be used in a lot of ways for personal and professional use. Big Data and mobile apps are converging in an enterprise and interacting; transforming the whole mobile ecosystem.
What is big data ? | Big Data ApplicationsShilpaKrishna6
Big data is similar to ‘small data’ but bigger in size. It is a term that describes the large volume of data both structured and unstructured. Big data generates value from the storage and processing of very large quantities of digital information that cannot be analyzed with traditional computing techniques
Digital Transformation: How to Build an Analytics-Driven CultureAlexander Loth
http://alexloth.com/2017/12/11/diversify-long-term-crypto-portfolio/
<- Follow-up blog post "How to diversify a Long-term Crypto Portfolio"!
Executive Talk, Frankfurt School of Finance & Management, 8 December 2017
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
This presentation talks about ‘Technology Innovation Trends In Insurance’. This covers seven themes that are reshaping supply & demand of #insurance globally, premium & profit pools are migrating across the #insurance value chain. Explains how value creation opportunities are different across mature & developing markets, how #technology & digital capabilities that target value chain effectiveness (not just scale efficiencies) offer compelling #investment opportunities. Also has #InsurTech levers and start-up examples in non-life insurance and life insurance.
Enterprises storing PII data on the cloud need to secure data at rest and in transit from intruders. A five-fold approach can help build guardrails for enterprise PII data.
Mohanbir Sawhney, Robert R. McCormick Tribune Foundation Clinical Professor of Technology Kellogg School of Management, Northwestern University presents at the 2012 Big Analytics Roadshow.
Companies are drinking from a fire hydrant of data that is too big, moving too fast and is too diverse to be analyzed by conventional database systems. Big Data is like a giant gold mine with large quantities of ore that is difficult to extract. To get value out of Big Data, enterprises need a new mindset and a new set of tools. They also need to know how to extract actionable insights from Big Data that can lead to competitive advantage. The Big Story of Big Data is not what Big Data is, but what it means for business value and competitive advantage.... read more: http://www.biganalytics2012.com/sessions.html#mohan_sawhney
Introduction
Big Data may well be the Next Big Thing in the IT world.
Big data burst upon the scene in the first decade of the 21st century.
The first organizations to embrace it were online and startup firms. Firms like Google, eBay, LinkedIn, and Face book were built around big data from the beginning.
Like many new information technologies, big data can bring about dramatic cost reductions, substantial improvements in the time required to perform a computing task, or new product and service offerings.
Check out how big data is proving invaluable to finance. Here is the top 10 big data trends in finance. Big data place a vital role in analysing the feeds, Predictive models, forecasts & assess trading impacts
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018 Alex Manders
Blockchain presentation materials from ISG's 2018 Digital Business Summit. Materials address emerging Enterprise trends with Blockchain. Materials link back to Alex's LinkedIn post containing more information behind the presentation: https://www.linkedin.com/pulse/blockchain-transforming-future-economy-recap-2018-alex-paul-manders/
The data value map for GDPR - How to extract Business Value from your GDPR Pr...Ken O'Connor
In this pack from the joint webinar between DAMA UK and DAMA Ireland, Ken O'Connor explains how smart businesses are using the DataValueMap.com (from Cork University Business School) to visually map their personal data supply chain and extract business value in the process.
The DataValueMap.com is a paper based, tech free, silo busting business tool that helps business managers build a shared understanding of any data initiative.
It's perfect for enabling business people to quickly sketch how critical information (such as personal data in the case of GDPR) flows through their business.
Ken explains how The Data Value Map applies "Nudge Principles" (including "Choice Architecture" and "Design Thinking") to Nudge the heads of each business function, i.e. the data stakeholders, to take responsibility for their role in the personal data "Information Supply Chain".
Data Protection Officers (DPOs) will find this very useful when performing Data Protection Impact Assessments (DPIAs).
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
With the exponential growth of data generation and collection stemming from new business models fueled by Big Data, cloud computing and the Internet of Things, we are potentially creating a cybercriminal's paradise where there are more opportunities than ever for that data to end up in the wrong hands. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems. In this webinar, Ulf Mattsson explores these issues and provides solutions to bring together data insight and security to safely unlock the power of digital business.
The top trends changing the landscape of Information ManagementVelrada
The role of information and data in the private sector, and how employees and users interact with that information, is changing rapidly.
With endless buzzwords and hot topics, and a ream of new technologies and upgrades, it can be difficult for organisations to know where to begin or how it translates into actionable insight.
Presented by Reto Cavegn at the 4th meeting: We would like to present IBM's view on BigData, what the market is requiring, and what products and strategies are evolved out of this requirements. Futher, we will present some reference projects to show, on what use cases customers are working today and what challanges our customers try to solve with BigData. Let me round up with some challenges and lessons we have learned.
Data Virtualization: Fulfilling The Digital Transformation Requirement In Ban...Denodo
Watch full webinar here: https://bit.ly/3szm3PV
In the digital transformation era, banks need a single view of all their data and a way to establish security controls across the entire infrastructure. This can be achieved with Data Virtualization.
Banking institutions need to update their legacy systems and implement strategies and services that will transform them into digital financial organizations.
They need agile access to information that can be leveraged to make timely business decisions, yet still fulfill the regulatory requirements. In the digital transformation era, banks need a single view of all their data and a way to establish security controls across the entire infrastructure.
This webinar presents:
- How data virtualization can help update and modernize data architectures,
- Success stories of financial companies that already use this technology to differentiate themselves from the competition, optimize processes, and create new business opportunities through more agile data management.
What is Big Data?
Big Data Laws
Why Big Data?
Industries using Big Data
Current process/SW in SCM
Challenges in SCM industry
How Big data can solve the problems?
Migration to Big data for an SCM industry
You probably have heard about Big Data, but ever wondered what it exactly is? And why should you care?
Mobile is playing a large part in driving this explosion in data. The data are also created by the apps and other services in the background. As people are moving towards more digital channels, tons of data are being created. This data can be used in a lot of ways for personal and professional use. Big Data and mobile apps are converging in an enterprise and interacting; transforming the whole mobile ecosystem.
What is big data ? | Big Data ApplicationsShilpaKrishna6
Big data is similar to ‘small data’ but bigger in size. It is a term that describes the large volume of data both structured and unstructured. Big data generates value from the storage and processing of very large quantities of digital information that cannot be analyzed with traditional computing techniques
Digital Transformation: How to Build an Analytics-Driven CultureAlexander Loth
http://alexloth.com/2017/12/11/diversify-long-term-crypto-portfolio/
<- Follow-up blog post "How to diversify a Long-term Crypto Portfolio"!
Executive Talk, Frankfurt School of Finance & Management, 8 December 2017
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
This presentation talks about ‘Technology Innovation Trends In Insurance’. This covers seven themes that are reshaping supply & demand of #insurance globally, premium & profit pools are migrating across the #insurance value chain. Explains how value creation opportunities are different across mature & developing markets, how #technology & digital capabilities that target value chain effectiveness (not just scale efficiencies) offer compelling #investment opportunities. Also has #InsurTech levers and start-up examples in non-life insurance and life insurance.
Enterprises storing PII data on the cloud need to secure data at rest and in transit from intruders. A five-fold approach can help build guardrails for enterprise PII data.
Mohanbir Sawhney, Robert R. McCormick Tribune Foundation Clinical Professor of Technology Kellogg School of Management, Northwestern University presents at the 2012 Big Analytics Roadshow.
Companies are drinking from a fire hydrant of data that is too big, moving too fast and is too diverse to be analyzed by conventional database systems. Big Data is like a giant gold mine with large quantities of ore that is difficult to extract. To get value out of Big Data, enterprises need a new mindset and a new set of tools. They also need to know how to extract actionable insights from Big Data that can lead to competitive advantage. The Big Story of Big Data is not what Big Data is, but what it means for business value and competitive advantage.... read more: http://www.biganalytics2012.com/sessions.html#mohan_sawhney
Introduction
Big Data may well be the Next Big Thing in the IT world.
Big data burst upon the scene in the first decade of the 21st century.
The first organizations to embrace it were online and startup firms. Firms like Google, eBay, LinkedIn, and Face book were built around big data from the beginning.
Like many new information technologies, big data can bring about dramatic cost reductions, substantial improvements in the time required to perform a computing task, or new product and service offerings.
Check out how big data is proving invaluable to finance. Here is the top 10 big data trends in finance. Big data place a vital role in analysing the feeds, Predictive models, forecasts & assess trading impacts
Blockchain - "Hype, Reality and Promise" - ISG Digital Business Summit, 2018 Alex Manders
Blockchain presentation materials from ISG's 2018 Digital Business Summit. Materials address emerging Enterprise trends with Blockchain. Materials link back to Alex's LinkedIn post containing more information behind the presentation: https://www.linkedin.com/pulse/blockchain-transforming-future-economy-recap-2018-alex-paul-manders/
The data value map for GDPR - How to extract Business Value from your GDPR Pr...Ken O'Connor
In this pack from the joint webinar between DAMA UK and DAMA Ireland, Ken O'Connor explains how smart businesses are using the DataValueMap.com (from Cork University Business School) to visually map their personal data supply chain and extract business value in the process.
The DataValueMap.com is a paper based, tech free, silo busting business tool that helps business managers build a shared understanding of any data initiative.
It's perfect for enabling business people to quickly sketch how critical information (such as personal data in the case of GDPR) flows through their business.
Ken explains how The Data Value Map applies "Nudge Principles" (including "Choice Architecture" and "Design Thinking") to Nudge the heads of each business function, i.e. the data stakeholders, to take responsibility for their role in the personal data "Information Supply Chain".
Data Protection Officers (DPOs) will find this very useful when performing Data Protection Impact Assessments (DPIAs).
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
With the exponential growth of data generation and collection stemming from new business models fueled by Big Data, cloud computing and the Internet of Things, we are potentially creating a cybercriminal's paradise where there are more opportunities than ever for that data to end up in the wrong hands. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems. In this webinar, Ulf Mattsson explores these issues and provides solutions to bring together data insight and security to safely unlock the power of digital business.
The top trends changing the landscape of Information ManagementVelrada
The role of information and data in the private sector, and how employees and users interact with that information, is changing rapidly.
With endless buzzwords and hot topics, and a ream of new technologies and upgrades, it can be difficult for organisations to know where to begin or how it translates into actionable insight.
In the insurance industry, the advantage of custom-built marts and warehouses ensures that the structure and queries match the data, but the customization makes it very difficult and expensive to maintain. On the other hand, off-the-shelf marts and warehouses maintained by the third party and are general and less useful than the custom ones. In either case, they can easily grow beyond anything manageable. This whitepaper focuses on providing an overview of data warehousing in the insurance industry.
-Enrichment - Unlocking the value of data for digital transformation - Big Da...webwinkelvakdag
As pressure for digital transformation increases, companies must harness big data more effectively. But the well-known V’s of data—volume, variety, velocity—represent both opportunities and challenges. Data enrichment enables organizations to take full advantage of the benefits while addressing these typical problems. In this session, we look at what an enrichment workflow might look like and how it enhances data’s value across different use cases.
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
Analytics Trends 2015: A below-the-surface lookDeloitte Canada
Big Data is a big deal for everyone these days and only growing in importance, especially when it comes to analytics generating actionable insights. Deloitte has identified eight significant analytics trends to watch in 2015 – including one supertrend that will impact everything else.
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
When organisations today connect digitally and the concept of a network is found to be fast disappearing. Mobile and Cloud solutions are being enabled across the enterprise to aid digital agendas. Calls for agility by the business are driving CIOs and CISOs to look for effective trust-based service enablement models that can help cater to business demand.
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
Efficient data filtering algorithm for Big Data technology Telecommunication is a concept aimed at effectively filtering desired information for preventive purposes, the challenges posed by unprecedented rise in volume, variety and velocity of information has necessitated the need for exploring various methods Big Data which is simply a data sets that are so large and complex that traditional data processing tools and technologies cannot cope with is been considered. The process of examining such data to uncover hidden patterns in them was evolved, this was achieved by coming up with an Algorithm comprising of various stages like Artificial neural Network, Backtracking Algorithm, Depth First Search, Branch and Bound and dynamic programming and error check. The algorithm developed gave rise to the flowchart, with each line of block representing a sub-algorithm.
This new document explores how Accenture can help financial services firms use a holistic data-centric approach to compliance and to respond to the requirements and challenges to the General Data Protection Regulation. Learn more: https://accntu.re/2uq8ANV
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
Title: Where Data Security and Data Value Meet in the Cloud
Abstract:
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
BrightTALK webinar, January 14, 2014
As the internet has expanded and criminals have found more ways of creating revenue from stolen information, the need for digital threat intelligence management (DTIM) has increased. Without a means of early identification, companies that are being targeted have no way of knowing their customer’s or employee’s security is threatened or that their brand is being stolen, resulting in an erosion of reputation. DTIM is the early warning system to aid those organizations in identifying the infringements and thefts before severe damage is done.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and RiskIQ -- highlight why DTIM is a growing necessity for mid- and large-sized organizations.
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
BrightTALK webinar January 14 2015
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
What trends will 2018 bring for Business Continuity Professionals?PECB
Many business continuity practitioners are perceiving a higher level of risk than ever before in their careers. Unfortunately, these risks are more often resulting in real incidents which require emergency response and continuity of operations. Being prepared may be the most important thing an organization can do in 2018. But what should we prepare for, and how should we prepare for it? This discussion will walk through some of the emerging threats concepts, tools, and techniques that business continuity professionals can expect to see more of in 2018.
Main points covered:
- What should we prepare for in 2018?
- How should we prepare?
- The emerging threats, concepts, tools, and techniques expected in 2018
- Emerging threats creating new risks
Presenter:
David Feeney, CPP, PMP has 17 years of security industry experience assisting organizations with risk management matters specific to physical, personnel, and cyber security. He has 9 years of experience with service providers and 8 years of experience within enterprise security organizations. David has worked with industry leaders in the energy, technology, healthcare, and real estate sectors. Areas of specialization include Security Operations Center design and management, Security Systems design and implementation, and Enterprise Risk Management. David holds leadership positions in ASIS International and is also a member of the InfraGard FBI program. David holds Certification Protection Professional (CPP) and Project Management Professional (PMP) certifications.
Andrea LeStarge, MS has over ten years of experience in program management, risk analysis and curriculum development. Being specialized in Homeland Security, Andrea leverages her experience in formerly managing projects to support various Federal Government entities in identifying, detecting and responding to man-made, natural and cyber incidents. She has an established track record in recognizing security gaps and corrective risk mitigation options, while effectively communicating findings to stakeholders, private sector owners and operators, and first-responder personnel within tactical, operational and strategic levels. Overall, Andrea encompasses analytical tradecraft and demonstrates consistent, repeatable and defensible methodologies pertaining to risk and the elements of threat, vulnerability and consequence.
Organizer: Nevila Muka
Date: January 17, 2018
Link to the recorded webinar:
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
3. Benjamin Nolan
Head of Business Development at Statice
Working with Statice's partners to help them overcome their data
access and privacy challenges with privacy-preserving synthetic data.
Speakers
Sven Guhr
Associate Director at Sopra Steria
Working on the topics of data analytics & artificial intelligence for
many years, advising leading financials organizations.
2
4. Synthetic data to
produce anonymized
data that will fuel
data-driven
use-cases
Applications for
privacy-preserving
synthetic data in the
financial industry
The challenges of
data-driven
innovation & the
competitive costs of
data inertia
Agenda
I. II
.
III.
3
5. The challenges of data-driven innovation
& the competitive costs of data inertia
4
6. Data fuels operational efficiency, personalized customer experiences and
product development.
Why is data so important?
“Customer intelligence will be the most important predictor
of revenue growth and profitability [...]”
Machine learning applications, and cloud infrastructures are gaining in
popularity. Both require greater data access and agility.
7. Data protection regulations in Europe
What prevents companies from accessing and using data?
“between 40 and 90 percent of banks’ workloads globally
could move to the cloud in a decade. [...] However, personally
sensitive data and trading data have not moved.”
Legacy systems with proprietary formats or siloed IT infrastructures
Data is too expensive to obtain, or its quality isn’t sufficient.
8. Data processing becomes a financial and business burden because it’s
resources intensive.
What is the cost to companies?
Teams lack the data agility required to innovate
Data is too expensive to obtain, or its quality isn’t sufficient.
“Companies arming their workers with data see a 32%
"significant increase" in product or service quality.”
11. The first step to protect data usually is to pseudonymize it
10
12. But data still contains information not unique to you:
"quasi-identifiers"
11
13. Sweeney, Latanya. Weaving Technology and Policy Together to Maintain Confidentiality. Journal of Law, Medicine
and Ethics, Vol. 25 1997, p. 98-110
Illustration: Massachusetts Governor leak
Medical data Voter list
12
14. Fingerprint-like information
• On its own, a fingerprint seems cryptic
• Around 100 minutiae in a fingerprint
• Experts declare a fingerprint match if 12 minutiae match
• Precise identification is possible if fingerprints are indexed and
queryable
13
15. Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets. InSecurity and
Privacy, 2008. SP 2008. IEEE Symposium on 2008 May 18 (pp. 111-125). IEEE.
Illustration: Netflix Movie Preferences
14
Ratings of only 4-5
films made it
possible to
successfully identify
a large number of
users.
16. Take-away: Pseudonymization is not enough
15
● Pseudonymization is not sufficient
● Do not assume anything about the attack scenario
● Auxiliary dataset may contain Personally Identifiable
Information
18. 17
“This regulation does not therefore concern
the processing of such anonymous
information, including for statistical or
research purposes.”
GDPR Recital 26
The best way to protect data, is to ensure strong safeguards
such as anonymization
19. A synthetic data generator to produce
anonymized data that will fuel
data-driven use-cases
18
26. Application: Cross-border ML
● Production financial data is difficult to access and can’t be shared
across borders.
● In multinational organizations, data teams and specific subject matter
experts are not always where the data is.
● Synthetic data provides quick access to relevant data for development
and testing, reducing staffing costs, and accelerating development
speed.
25
28. Application: Supporting Innovation with Sandboxing
“...we have been exploring the concept of a digital sandbox.
This will enhance some existing features of our innovation
services [...] providing innovative firms access to high
quality synthetic data sets to be able to test and develop
proofs of concept in a digital testing environment.”
27