This document contains a record of certifications held by Jungchan Hsieh, including over 50 Microsoft certifications achieved between 2000-2019. It lists certification IDs, types of certifications, versions, and dates achieved and inactive for each certification. The certifications range from entry-level roles to expert-level certifications across technologies including Windows, Azure, SQL Server, SharePoint, programming, and more.
This resume is for Jungchan Hsieh, who has extensive experience and education in healthcare management, information technology management, and related fields. He has over 15 years of experience working as a data scientist, web developer, SQL DBA, and systems analyst. He has skills in languages like C#, VB.NET, Java, Python and databases like SQL Server, Oracle, and MySQL. He holds multiple certifications and has completed many online courses in data analysis, machine learning, and healthcare IT.
Jungchan (Roger) Hsieh has extensive experience in healthcare management, information technology management, and computer science. He holds multiple graduate degrees from the University of Texas at Dallas as well as undergraduate degrees from the University of North Texas. His skills include programming languages, databases, systems, and software. Currently he works as a data scientist where he develops web applications and creates database triggers and stored procedures.
This document provides a summary of Microsoft certifications held by Jungchan Hsieh, including:
- Over 50 active and legacy Microsoft certifications in areas such as SQL Server, SharePoint, Azure, programming, and more.
- Certifications were achieved between 2000-2015 with the most recent in January 2015.
- Certifications include Microsoft Certified Solutions Expert, Microsoft Specialist, Microsoft Certified Associate, and others.
This document provides a summary of Microsoft certifications held by Jungchan Hsieh, including:
- Over 30 active Microsoft certifications in areas such as Web Applications, Programming in HTML5/JavaScript, SQL Server, ASP.NET, Windows Developer, and SharePoint.
- Certifications were achieved between 2007-2013.
- Over 20 additional Microsoft exams were passed, related to technologies such as ASP.NET MVC, Windows Azure, HTML5, SharePoint, and Windows Server.
- Several inactive certifications are also listed from earlier years in technologies including Windows 2000, SQL Server 2000, and Visual Studio 6.0.
This document contains certification information for VJUNGCHAN HSIEH. It lists numerous Microsoft certifications they have achieved including Microsoft Specialist, Microsoft Certified Solutions Associate, Microsoft Certified Professional Developer, and Microsoft Certified IT Professional. It also lists over 50 Microsoft certification exams they have passed with dates ranging from May 2000 to May 2013.
This document contains a record of certifications held by Jungchan Hsieh, including over 50 Microsoft certifications achieved between 2000-2019. It lists certification IDs, types of certifications, versions, and dates achieved and inactive for each certification. The certifications range from entry-level roles to expert-level certifications across technologies including Windows, Azure, SQL Server, SharePoint, programming, and more.
This resume is for Jungchan Hsieh, who has extensive experience and education in healthcare management, information technology management, and related fields. He has over 15 years of experience working as a data scientist, web developer, SQL DBA, and systems analyst. He has skills in languages like C#, VB.NET, Java, Python and databases like SQL Server, Oracle, and MySQL. He holds multiple certifications and has completed many online courses in data analysis, machine learning, and healthcare IT.
Jungchan (Roger) Hsieh has extensive experience in healthcare management, information technology management, and computer science. He holds multiple graduate degrees from the University of Texas at Dallas as well as undergraduate degrees from the University of North Texas. His skills include programming languages, databases, systems, and software. Currently he works as a data scientist where he develops web applications and creates database triggers and stored procedures.
This document provides a summary of Microsoft certifications held by Jungchan Hsieh, including:
- Over 50 active and legacy Microsoft certifications in areas such as SQL Server, SharePoint, Azure, programming, and more.
- Certifications were achieved between 2000-2015 with the most recent in January 2015.
- Certifications include Microsoft Certified Solutions Expert, Microsoft Specialist, Microsoft Certified Associate, and others.
This document provides a summary of Microsoft certifications held by Jungchan Hsieh, including:
- Over 30 active Microsoft certifications in areas such as Web Applications, Programming in HTML5/JavaScript, SQL Server, ASP.NET, Windows Developer, and SharePoint.
- Certifications were achieved between 2007-2013.
- Over 20 additional Microsoft exams were passed, related to technologies such as ASP.NET MVC, Windows Azure, HTML5, SharePoint, and Windows Server.
- Several inactive certifications are also listed from earlier years in technologies including Windows 2000, SQL Server 2000, and Visual Studio 6.0.
This document contains certification information for VJUNGCHAN HSIEH. It lists numerous Microsoft certifications they have achieved including Microsoft Specialist, Microsoft Certified Solutions Associate, Microsoft Certified Professional Developer, and Microsoft Certified IT Professional. It also lists over 50 Microsoft certification exams they have passed with dates ranging from May 2000 to May 2013.
This document contains certification information for VJUNGCHAN HSIEH. It lists numerous Microsoft certifications they have achieved including Microsoft Specialist, Microsoft Certified Solutions Associate, Microsoft Certified Professional Developer, and Microsoft Certified IT Professional. It provides details of over 50 Microsoft certification exams they have passed successfully, dating back to 2000, covering technologies such as Windows, SQL Server, SharePoint, .NET, and more.
This document summarizes Jungchan Hsieh's Microsoft certifications, including over 40 certifications achieved between 2000-2013 in areas such as programming, database administration, web development, SharePoint, and more. Their certifications range from entry-level technician certifications to expert-level certifications.
Jungchan Hsieh successfully completed the requirements for Microsoft Certified Technology Specialist: SharePoint 2010, Application Development certification on September 25, 2012 as verified by Steven A. Ballmer, Chief Executive Officer of Microsoft. The certification is valid until revoked and the number is E016-1153.
Jungchan Hsieh successfully completed the requirements to be recognized as a Microsoft Certified IT Professional: SharePoint Administrator 2010 on April 10, 2012. The certification was issued by Steven A. Ballmer, Chief Executive Officer of Microsoft, and the certification number is D707-3867.
The document provides a summary of Microsoft certifications held by Jungchan Hsieh, including certifications in SQL Server 2008, ASP.NET Developer 3.5, Windows Developer, Web Developer, SharePoint Administrator 2010, and more. Hsieh has over 30 active Microsoft certifications ranging from Microsoft Certified Solutions Associate to Microsoft Certified Technology Specialist, with certification numbers and achievement dates listed.
The document provides details on Jungchan Hsieh's Microsoft certifications, including certification IDs and dates achieved. He holds numerous Microsoft certifications including MCPD, MCITP, MCTS, and has certifications in technologies such as ASP.NET, SQL Server, SharePoint, and Windows. His most recent certification was achieved in April 2012 for SharePoint Administrator 2010.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
This document contains certification information for VJUNGCHAN HSIEH. It lists numerous Microsoft certifications they have achieved including Microsoft Specialist, Microsoft Certified Solutions Associate, Microsoft Certified Professional Developer, and Microsoft Certified IT Professional. It provides details of over 50 Microsoft certification exams they have passed successfully, dating back to 2000, covering technologies such as Windows, SQL Server, SharePoint, .NET, and more.
This document summarizes Jungchan Hsieh's Microsoft certifications, including over 40 certifications achieved between 2000-2013 in areas such as programming, database administration, web development, SharePoint, and more. Their certifications range from entry-level technician certifications to expert-level certifications.
Jungchan Hsieh successfully completed the requirements for Microsoft Certified Technology Specialist: SharePoint 2010, Application Development certification on September 25, 2012 as verified by Steven A. Ballmer, Chief Executive Officer of Microsoft. The certification is valid until revoked and the number is E016-1153.
Jungchan Hsieh successfully completed the requirements to be recognized as a Microsoft Certified IT Professional: SharePoint Administrator 2010 on April 10, 2012. The certification was issued by Steven A. Ballmer, Chief Executive Officer of Microsoft, and the certification number is D707-3867.
The document provides a summary of Microsoft certifications held by Jungchan Hsieh, including certifications in SQL Server 2008, ASP.NET Developer 3.5, Windows Developer, Web Developer, SharePoint Administrator 2010, and more. Hsieh has over 30 active Microsoft certifications ranging from Microsoft Certified Solutions Associate to Microsoft Certified Technology Specialist, with certification numbers and achievement dates listed.
The document provides details on Jungchan Hsieh's Microsoft certifications, including certification IDs and dates achieved. He holds numerous Microsoft certifications including MCPD, MCITP, MCTS, and has certifications in technologies such as ASP.NET, SQL Server, SharePoint, and Windows. His most recent certification was achieved in April 2012 for SharePoint Administrator 2010.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.