SlideShare a Scribd company logo
Data protection has never been
more relevant than in today’s
data-driven world
#privacymatters
39%of
companies
globally
experienced a
data breach in
20181 - and seems
to be rising at an
exponential rate2
At least
20%
in revenue
loss3
Stock
underperformance of
up to 15.6%
after 3 years5
Expected Loss of
at least
7.8% of revenue
and up to
€7.8 million in fines
and up to
6.1%in stocks after 3 years
What happens if you do not protect data
&
{ }&
Fines up to
4%
of global
revenue4
Data Protection
Security Privacy
Can protect data from
breaches, but there is still a
chance it will get breached.
Even if security is breached, it still can protect data
while providing accurate information.
Limited access behind lock
and key because very
limited number of people
are entrusted with the key.
Anyone can access the protected data =>
Finding better business solutions faster for data-
holding company by enabling more cooperation
and competition for best analytics solutions
Privacy is better value prop for business and markets
Why Privacy instead of Security?
A real life example
• A Car Rental company is trying to privatize its data so that
when they give this data to an Analytics company, it would
not leak the privacy of an individual customer. However, the
Analytics company wants to learn accurate patterns from the
Car Rental company’s client base to provide more business
value to the Car Rental company.
• Car Rental company had categorical (label) data about its clients
rentals.
• It wanted to focus on which cars to buy more and who to market to in
order to increase profit.
Let us take this to be the Car Rental company’s data*
MVP Demo
Ford
Honda
Cadillac
Note: Solution is NOT
restricted to only 2
numerical attributes.
This example is used to
easily understand our
product.
In general, current MVP
can operate over an
unrestricted number of
both categorical and
numerical attributes with
categorical outputs.
Obfuscated data
Data is noised up in
input attributes and
output labels.
MVP Demo
Obfuscated Data
MVP Demo
Since obfuscated points can be linked to
individuals in the original data that are
identifiable from a group or in a certain region…
Original Data
Suppressed data (shown in orange)
MVP Demo
…we suppress them
(not show them).
Returned Data
MVP Demo
We operate with
categorical input
attributes in a similar
way.
Returned Data
Comparison
As you can tell…
• Vulnerable parts of the original data cannot be reverse engineered
• Any individual changes to the original dataset will not affect any statistics
of the returned data
Original Data
WHAT OTHER PRIVACY COMPANIES DO
Start – Original Data
Obfuscation
Count of label/
Most prevalent label
End – Aggregated Result
Some Limited Information Query
− Not much information
Scenario A:
WHAT OTHER PRIVACY COMPANIES DO
Start – Original Data
Obfuscation
Count of label/
Most prevalent label
End – Aggregated Result
Some Limited Information Query
− Not much informationScenario B:
WHAT WE DO
Start – Original Data
Obfuscation
Suppress
privacy-
violating
obfuscated
data
End – Privatized Dataset Result − Provides depth of info
Disruptive Impacts
• Compared to what other data privatization methods do, we
allow any data analyst to receive the entire data so that they
can analyze it however they want to.
• Companies can reduce overhead costs by safely outsourcing
the data analysis without restricting how the data is analyzed
or without giving up too much accuracy in the results.
Milestones
March 2019 Started business and acquire startup advisor
April 2019 Invited by SV Sandhill Road investors regarding potential
May 2019 Trial version released
Let’s build a better protected tomorrow!
Email: banerjeearjun73@gmail.com
LinkedIn: https://www.linkedin.com/in/arjunbanerjee77/
Residence: Bay Area, CA, USA

More Related Content

Similar to Privatex Software

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
Capgemini
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Dataconomy Media
 
Big Data - from hype to reality
Big Data - from hype to realityBig Data - from hype to reality
Big Data - from hype to reality
vrbenjamins
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
LaLaBlaGhvgT
 
Why 4Segment
Why 4SegmentWhy 4Segment
Why 4Segment
Mark T. LeVell
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
4Thought Marketing
 
James foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpinJames foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpin
B2B Marketing
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
PSD Group Ltd
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
Human Capital Department
 
How To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless FutureHow To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless Future
Search Engine Journal
 
SPSS Solutions
SPSS SolutionsSPSS Solutions
SPSS Solutions
Phi Jack
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
Jim Kaplan CIA CFE
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 

Similar to Privatex Software (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
Big Data - from hype to reality
Big Data - from hype to realityBig Data - from hype to reality
Big Data - from hype to reality
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
Why 4Segment
Why 4SegmentWhy 4Segment
Why 4Segment
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
James foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpinJames foulkes, director and co founder, kingpin
James foulkes, director and co founder, kingpin
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
Andy fisher
Andy fisherAndy fisher
Andy fisher
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
How To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless FutureHow To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless Future
 
SPSS Solutions
SPSS SolutionsSPSS Solutions
SPSS Solutions
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 

Recently uploaded

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 

Recently uploaded (20)

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

Privatex Software

  • 1. Data protection has never been more relevant than in today’s data-driven world #privacymatters
  • 2. 39%of companies globally experienced a data breach in 20181 - and seems to be rising at an exponential rate2 At least 20% in revenue loss3 Stock underperformance of up to 15.6% after 3 years5 Expected Loss of at least 7.8% of revenue and up to €7.8 million in fines and up to 6.1%in stocks after 3 years What happens if you do not protect data & { }& Fines up to 4% of global revenue4
  • 3. Data Protection Security Privacy Can protect data from breaches, but there is still a chance it will get breached. Even if security is breached, it still can protect data while providing accurate information. Limited access behind lock and key because very limited number of people are entrusted with the key. Anyone can access the protected data => Finding better business solutions faster for data- holding company by enabling more cooperation and competition for best analytics solutions Privacy is better value prop for business and markets Why Privacy instead of Security?
  • 4. A real life example • A Car Rental company is trying to privatize its data so that when they give this data to an Analytics company, it would not leak the privacy of an individual customer. However, the Analytics company wants to learn accurate patterns from the Car Rental company’s client base to provide more business value to the Car Rental company. • Car Rental company had categorical (label) data about its clients rentals. • It wanted to focus on which cars to buy more and who to market to in order to increase profit.
  • 5. Let us take this to be the Car Rental company’s data* MVP Demo Ford Honda Cadillac Note: Solution is NOT restricted to only 2 numerical attributes. This example is used to easily understand our product. In general, current MVP can operate over an unrestricted number of both categorical and numerical attributes with categorical outputs.
  • 6. Obfuscated data Data is noised up in input attributes and output labels. MVP Demo
  • 7. Obfuscated Data MVP Demo Since obfuscated points can be linked to individuals in the original data that are identifiable from a group or in a certain region… Original Data
  • 8. Suppressed data (shown in orange) MVP Demo …we suppress them (not show them).
  • 9. Returned Data MVP Demo We operate with categorical input attributes in a similar way.
  • 10. Returned Data Comparison As you can tell… • Vulnerable parts of the original data cannot be reverse engineered • Any individual changes to the original dataset will not affect any statistics of the returned data Original Data
  • 11. WHAT OTHER PRIVACY COMPANIES DO Start – Original Data Obfuscation Count of label/ Most prevalent label End – Aggregated Result Some Limited Information Query − Not much information Scenario A:
  • 12. WHAT OTHER PRIVACY COMPANIES DO Start – Original Data Obfuscation Count of label/ Most prevalent label End – Aggregated Result Some Limited Information Query − Not much informationScenario B:
  • 13. WHAT WE DO Start – Original Data Obfuscation Suppress privacy- violating obfuscated data End – Privatized Dataset Result − Provides depth of info
  • 14. Disruptive Impacts • Compared to what other data privatization methods do, we allow any data analyst to receive the entire data so that they can analyze it however they want to. • Companies can reduce overhead costs by safely outsourcing the data analysis without restricting how the data is analyzed or without giving up too much accuracy in the results.
  • 15. Milestones March 2019 Started business and acquire startup advisor April 2019 Invited by SV Sandhill Road investors regarding potential May 2019 Trial version released
  • 16. Let’s build a better protected tomorrow! Email: banerjeearjun73@gmail.com LinkedIn: https://www.linkedin.com/in/arjunbanerjee77/ Residence: Bay Area, CA, USA