POPULARITY
Categories
Mark Ericksen, creator of the Elixir LangChain framework, joins the Elixir Wizards to talk about LLM integration in Elixir apps. He explains how LangChain abstracts away the quirks of different AI providers (OpenAI, Anthropic's Claude, Google's Gemini) so you can work with any LLM in one more consistent API. We dig into core features like conversation chaining, tool execution, automatic retries, and production-grade fallback strategies. Mark shares his experiences maintaining LangChain in a fast-moving AI world: how it shields developers from API drift, manages token budgets, and handles rate limits and outages. He also reveals testing tactics for non-deterministic AI outputs, configuration tips for custom authentication, and the highlights of the new v0.4 release, including “content parts” support for thinking-style models. Key topics discussed in this episode: • Abstracting LLM APIs behind a unified Elixir interface • Building and managing conversation chains across multiple models • Exposing application functionality to LLMs through tool integrations • Automatic retries and fallback chains for production resilience • Supporting a variety of LLM providers • Tracking and optimizing token usage for cost control • Configuring API keys, authentication, and provider-specific settings • Handling rate limits and service outages with degradation • Processing multimodal inputs (text, images) in Langchain workflows • Extracting structured data from unstructured LLM responses • Leveraging “content parts” in v0.4 for advanced thinking-model support • Debugging LLM interactions using verbose logging and telemetry • Kickstarting experiments in LiveBook notebooks and demos • Comparing Elixir LangChain to the original Python implementation • Crafting human-in-the-loop workflows for interactive AI features • Integrating Langchain with the Ash framework for chat-driven interfaces • Contributing to open-source LLM adapters and staying ahead of API changes • Building fallback chains (e.g., OpenAI → Azure) for seamless continuity • Embedding business logic decisions directly into AI-powered tools • Summarization techniques for token efficiency in ongoing conversations • Batch processing tactics to leverage lower-cost API rate tiers • Real-world lessons on maintaining uptime amid LLM service disruptions Links mentioned: https://rubyonrails.org/ https://fly.io/ https://zionnationalpark.com/ https://podcast.thinkingelixir.com/ https://github.com/brainlid/langchain https://openai.com/ https://claude.ai/ https://gemini.google.com/ https://www.anthropic.com/ Vertex AI Studio https://cloud.google.com/generative-ai-studio https://www.perplexity.ai/ https://azure.microsoft.com/ https://hexdocs.pm/ecto/Ecto.html https://oban.pro/ Chris McCord's ElixirConf EU 2025 Talk https://www.youtube.com/watch?v=ojL_VHc4gLk Getting started: https://hexdocs.pm/langchain/gettingstarted.html https://ash-hq.org/ https://hex.pm/packages/langchain https://hexdocs.pm/igniter/readme.html https://www.youtube.com/watch?v=WM9iQlQSFg @brainlid on Twitter and BlueSky Special Guest: Mark Ericksen.
Shana Sissel says tariffs complicate the Fed's fight against inflation because of uncertainty. She believes the central bank is waiting for a way to justify a rate cut, but doesn't believe one is coming soon. Shana is positioning her portfolio for further volatility and provides several stock picks she likes, including CrowdStrike (CRWD) and Leidos (LDOS). ======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Next in Media spoke with Dr. Mark Grether SVP & General Manager, PayPal Ads, on why he thinks the company's 'transaction graph' may be even more powerful than some retailers' data for advertising, and why there's nothing to worry about with a company that has so many people's banking information to use that data for ad targeting.
In this episode of The Tech Leader's Playbook, Avetis Antaplyan interviews Philip Merrick, a seasoned technologist and CEO of pgEdge. They discuss Merrick's journey in the tech industry, the evolution of leadership styles, the importance of building great teams, and the vision behind pgEdge. The conversation also covers the evolution of cloud computing, data security, and fostering a culture of innovation within teams. In this conversation, Phillip Merrick shares his insights on the importance of mentorship in career growth, the key lessons for emerging leaders, and how to stay ahead of technology trends. He emphasizes the significance of building trust and accountability within teams and discusses the exciting potential of AI in leadership. Merrick distills his entrepreneurial philosophy into actionable advice, highlighting the need for adaptability and genuine care for team members.TakeawaysThe web protocols allowed for the automation of information exchange.Leadership styles evolve with experience and challenges faced.A great team is more important than a great idea.Transparency with the team builds trust and commitment.Curiosity drives innovation and problem-solving.Incremental innovation is often more impactful than radical changes.Cloud concentration risk is a growing concern for regulated industries.Data security and compliance are critical in software development.Fostering a culture of curiosity leads to better adaptability.Asking the right questions in interviews reveals a candidate's mindset.Mentorship is crucial for career growth and success.Emerging leaders should focus on articulating mission, vision, and values.Technology must be contextualized within business and societal trends.Building trust is essential for effective teamwork and accountability.AI has the potential to enhance leadership and management practices.Adaptability is key to overcoming challenges in entrepreneurship.Caring for team members fosters loyalty and engagement.Clear communication of company values prevents cultural drift.A strong team culture can be a competitive advantage. Chapters00:00 The Genesis of Innovation04:07 Leadership Evolution and Challenges08:52 Building a Great Team12:00 The Vision Behind pgEdge17:57 Navigating Cloud Evolution20:54 Data Security and Compliance23:55 Fostering Innovation and Adaptability27:38 The Importance of Mentorship in Career Growth31:19 Key Lessons for Emerging Leaders34:07 Staying Ahead of Technology Trends39:43 Building Trust and Accountability in Teams40:44 Exciting Trends in AI and Leadership43:16 Core Entrepreneurial PhilosophyPhillip Merrick's Social Media Links:https://www.linkedin.com/in/phillipmerrick/Phillip Merrick's Website:https://www.pgedge.com/Resources and Links:https://www.hireclout.comhttps://www.podcast.hireclout.comhttps://www.linkedin.com/in/hirefasthireright
Logan sits down with Bipul Sinha, CEO and co-founder of Rubrik and former VC at Lightspeed and Blumberg Capital. Bipul shares what he learned transitioning from investor to founder, why intuition beats expertise, and how he built Rubrik into a category-defining business by betting on uncool ideas. They talk product-market fit in the AI era, what most VCs get wrong today, and why the enterprise IT market is still just getting started. It's a conversation packed with hard-earned wisdom and bold takes on building lasting companies. (00:00) Intro (01:42) Transitioning from VC to Founder (02:27) The Genesis of Rubrik (03:30) Navigating Uncertainty in Business (06:57) Product Market Fit and Early Success (08:56) Evolving with the Market (13:14) AI and Data Security (18:53) Leadership and Intuition (28:34) Building a Transparent Culture (31:52) Handling Tough Questions in Board Meetings (33:28) Changing Perspectives Over Time (34:57) Traits of Successful Entrepreneurs (36:46) The Future of Venture Capital and Startups (40:38) Balancing Forward and Lateral Motion in Business (42:35) The Impact of AI on Various Industries (01:00:28) The Evolution of Work and Technology (01:02:52) Fostering a Collaborative Company Culture (01:04:56) Looking Ahead: The Future of Rubrik Executive Producer: Rashad Assir Producer: Leah Clapper Mixing and editing: Justin Hrabovsky Check out Unsupervised Learning, Redpoint's AI Podcast: https://www.youtube.com/@UCUl-s_Vp-Kkk_XVyDylNwLA
Mike Thompson is the Director, Cloud and Security Architecture at Varonis. In this episode, he joins host Paul John Spaulding to discuss Varonis' 2025 State of Data Security report, including the latest threats, how companies can stay protected, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
This episode delves into the dynamic future of retail, spotlighting the pivotal role of AI in reshaping supply chains and customer interactions by 2025. Experts discuss how retailers are harnessing AI to deliver hyper-personalized shopping experiences, leveraging clean data to anticipate consumer needs and optimize inventory. The conversation explores the increasing importance of sustainability, with brands adopting eco-friendly practices and transparent supply chains to meet conscious consumer demands. The rise of social commerce platforms like TikTok is also examined, revealing how retailers are integrating social media into their sales strategies and supply chain management for unprecedented agility. This episode offers valuable insights into how technology, strategic data utilization, and a commitment to sustainability are converging to redefine the retail landscape and create new opportunities for brands and consumers alike.
Today's guest is Jiaxi Zhu, Head of Analytics & Insights at Google. Jiaxi joins Emerj Editorial Director Matthew DeMello to explore how enterprises can strengthen data security and governance as customer analytics increasingly relies on both structured and unstructured data. As organizations expand their use of sources like call transcripts, social media posts, and third-party platforms, traditional data protection models are no longer sufficient. Jiaxi explains how modernizing data governance with comprehensive data dictionaries and metadata management is essential for understanding data lineage and ensuring compliance. Learn how brands work with Emerj and other Emerj Media options at emerj.com/ad1. Want to share your AI adoption story with executive peers? Click emerj.com/expert2 for more information and to be a potential future guest on the ‘AI in Business' podcast!
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the ransomware attack that recently hit Marks & Spencer. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Get featured on the show by leaving us a Voice Mail: https://bit.ly/MIPVM FULL SHOW NOTES https://www.microsoftinnovationpodcast.com/692 When organizations rush to adopt AI tools like Microsoft Copilot, they often overlook a critical prerequisite: a secure, well-structured data environment. In this episode, Åsne Holtklimpen—Cloud Solution Architect at Crayon and Microsoft MVP—shares how her journey from SharePoint veteran to Copilot expert revealed a hard truth: without strong information governance, AI can do more harm than good. Åsne walks us through real-world challenges, practical frameworks, and the mindset shift needed to make AI adoption safe, scalable, and truly transformative. KEY TAKEAWAYS Security Before AI: Successful Copilot implementation starts with robust information security—classification, labeling, and governance must come first. Start Small, Scale Smart: Åsne recommends a phased approach using Microsoft Purview, beginning with basic data classification before layering on policies and automation. Expose the Risks: Demonstrating real data exposure—like personal identity numbers or health info—helps organizations understand the urgency of securing their environments. AI Readiness ≠ Cloud Presence: Many companies assume they're ready for AI because they use Teams or SharePoint, but Åsne stresses the need for deeper structural alignment. Public Sector Pressure: Norway's public sector faces a mandate to adopt AI by 2030, but Åsne warns that without guidance and foundational readiness, this push could backfire. RESOURCES MENTIONED
Victoria Chin of Asana and Michael Horn of AWS demonstrate how Amazon Q integrates with Asana to enable AI-powered workflows while dramatically reducing manual work and improving cross-functional collaboration.Topics Include:Victoria Chin introduces herself as Asana's CPO Chief of StaffMichael Horn from AWS discusses customer feedback on generative AIAI agents limited by quality of data pulled into themAmazon Q Business created to analyze information and take actionHundreds of customers using Q Business across various industries dailyAWS hosts most business applications, ideal for AI journeyAmazon Q has most built-in, managed, secure data connectors availableQ Index creates comprehensive, accessible index of all company dataSecurity permissions automatically pulled in, no manual configuration neededSupports both structured and unstructured data from multiple sourcesVictoria returns to discuss Asana's integration with Q IndexBillions invested in integrations, but usage still lags behindTeams switch between apps 1000 times daily, missing connectionsRoot problem: no reliable way to track who/what/when/whyContent platforms store work but don't manage or coordinateAsana bridges content and communication for effective teamwork scalingAI disrupting software, but questions remain about real valueSoftware must provide structured framework to guide LLMs effectivelyAI needs data AND structure to separate signal from noiseAsana Work Graph maps how work actually gets done organizationallyWork Graph visualized as interconnected data, not rows and columnsMost strategic work is cross-functional, requiring multiple teams collaboratingTraditional integrations require manual setup and knowing when to useQ Index gives Asana access to 40+ different data connectorsUsers can ask questions, get answers with cross-application contextAI Studio enables no-code building of workflows with AI agentsProduct launch example shows intake, planning, execution, and reporting stagesAI can surface relevant documents, research, and updates automaticallyChat is tip of iceberg; real power comes from embedded workflowsIntegration evolves from feature-level to AI-powered product-level connectionsParticipants:Victoria J. Chin – Chief of Staff / Product Strategy, AI, AsanaMichael Horn – Principal Head of Business Development – Artificial Intelligence & Machine Learning, AWSSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/
On this episode of the Rebel Tech Podcast, TPPF's John Mondi is joined by Richardson ISD Assistant Superintendent Dr. Matthew Gibbins and Jeanne Mallory, a teacher from Rancier Middle School in Killeen ISD to discuss how their districts have taken the initiative to eliminate the distractions of phones in the classroom as well as some potential support from the state in the form of legislation.
GoldenGate 23ai takes security seriously, and this episode unpacks everything you need to know. GoldenGate expert Nick Wagner breaks down how authentication, access roles, and encryption protect your data. Learn how GoldenGate integrates with identity providers, secures communication, and keeps passwords out of storage. Understand how trail files work, why they only store committed data, and how recovery processes prevent data loss. Whether you manage replication or just want to tighten security, this episode gives you the details to lock things down without slowing operations. Oracle GoldenGate 23ai: Fundamentals: https://mylearn.oracle.com/ou/course/oracle-goldengate-23ai-fundamentals/145884/237273 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. -------------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Welcome, everyone! This is our fourth episode on Oracle GoldenGate 23ai. Last week, we discussed the terminology, different processes and what they do, and the architecture of the product at a high level. Today, we have Nick Wagner back with us to talk about the security strategies of GoldenGate. 00:56 Lois: As you know by now, Nick is a Senior Director of Product Management for GoldenGate at Oracle. He's played a key role as one of the product designers behind the latest version of GoldenGate. Hi Nick! Thank you for joining us again. Can you tell us how GoldenGate takes care of data security? Nick: So GoldenGate authentication and authorization is done in a couple of different ways. First, we have user credentials for GoldenGate for not only the source and target databases, but also for GoldenGate itself. We have integration with third-party identity management products, and everything that GoldenGate does can be secured. 01:32 Nikita: And we must have some access roles, right? Nick: There's four roles built into the GoldenGate product. You have your security role, administrator, operator, and user. They're all hierarchical. The most important one is the security user. This user is going to be the one that provides the administrative tasks. This user is able to actually create additional users and assign roles within the product. So do not lose this password and this user is extremely important. You probably don't want to use this security user as your everyday user. That would be your administrator. The administrator role is able to perform all administrative tasks within GoldenGate. So not only can they go in and create new extracts, create new replicats, create new distribution services, but they can also start and stop them. And that's where the operator role is and the user role. So the operator role allows you to go in and start/stop processes, but you can't create any new ones, which is kind of important. So this user would be the one that could go in and suspend activity. They could restart activity. But they can't actually add objects to replication. The user role is really a read-only role. They can come in. They can see what's going on. They can look at the log files. They can look at the alerts. They can look at all the watches and see exactly what GoldenGate is doing. But they're unable to make any changes to the product itself. 02:54 Lois: You mentioned the roles are hierarchical in nature. What does that mean? Nick: So anything that the user role does can be done by the operator. Anything that the operator and user roles can do can be done by the administrator. And anything that the user, operator, and administrator roles do can be done by the security role. 03:11 Lois: Ok. So, is there a single sign-on available for GoldenGate? Nick: We also have a password plugin for GoldenGate Connections. A lot of customers have asked for integration with whatever their single sign-on utility is, and so GoldenGate now has that with GoldenGate 23ai. So these are customer-created entities. So, we have some examples that you can use in our documentation on how to set up an identity provider or a third-party identity provider with GoldenGate. And this allows you to ensure that your corporate standards are met. As we started looking into this, as we started designing it, every single customer wanted something different. And so instead of trying to meet the needs for every customer and every possible combination of security credentials, we want you to be able to design it the way you need it. The passwords are never stored. They're only retrieved from the identity provider by the plugin itself. 04:05 Nikita: That's a pretty important security aspect…that when it's time to authenticate a user, we go to the identity provider. Nick: We're going to connect in and see if that password is matching. And only then do we use it. And as soon as we detect that it's matched, that password is removed. And then for the extract and replicats themselves, you can also use it for the database, data source, and data target connections, as well as for the GoldenGate users. So, it is a full-featured plugin. So, our identity provider plugin works with IAM as well as OAM. These are your standard identity manager authentication methods. The standard one is OAuth 2, as well as OIDC. And any Identity Manager that uses that is able to integrate with GoldenGate. 04:52 Lois: And how does this work? Nick: The way that it works is pretty straightforward. Once the user logs into the database, we're going to hand off authentication to the identity provider. Once the identity provider has validated that user's identity and their credentials, then it comes back to GoldenGate and says that user is able to log in to either GoldenGate or the application or the database. Once the user is logged in, we get that confirmation that's been sent out and they can continue working through GoldenGate. So, it's very straightforward on how it works. There's also a nice little UI that will help set up each additional user within those systems. All the communication is also secured as well. So any communication done through any of the GoldenGate services is encrypted using HTTPS. All the REST calls themselves are all done using HTTPS as well. All the data protection calls and all the communication across the network when we send data across a distribution service is encrypted using a secure WebSocket. And there's also trail file encryption at the operating system level for data at REST. So, this really gives you the full level of encryption for customers that need that high-end security. GoldenGate does have an option for FIPS 140-2 compliance as well. So that's even a further step for most of those customers. 06:12 Nikita: That's impressive! Because we want to maintain the highest security standards, right? Especially when dealing with sensitive information. I now want to move on to trail files. In our last episode, we briefly spoke about how they serve as logs that record and track changes made to data. But what more can you tell us about them, Nick? Nick: There's two different processes that write to the trail files. The extract process will write to the trail file and the receiver service will write to the trail file. The extract process is going to write to the trail file as it's pulling data out of that source database. Now, the extract process is controlled by a parameter file, that says, hey, here's the exact changes that I'm going to be pulling out. Here's the tables. Here's the rows that I want. As it's pulling that data out and writing it to the trail files, it's ensuring that those trail files have enough information so that the replicat process can actually construct a SQL statement and apply that change to that target platform. And so there's a lot of ways to change what's actually stored in those trail files and how it's handled. The trail files can also be used for initial loads. So when we do the initial load through GoldenGate, we can grab and write out the data for those tables, and that excludes the change data. So initial loads is pulling the data directly from the tables themselves, whereas ongoing replication is pulling it from the transaction logs. 07:38 Lois: But do we need to worry about rollbacks? Nick: Our trail files contain committed data only and all data is sequential. So this is two important things. Because it contains committed data only, we don't need to worry about rollbacks. We also don't need to worry about position within that trail file because we know all data is sequential. And so as we're reading through the trail file, we know that anything that's written in a prior location in that trial file was committed prior to something else. And as we get into the recovery aspects of GoldenGate, this will all make a lot more sense. 08:13 Lois: Before we do that, can you tell us about the naming of trail files? Nick: The trail files as far as naming, because these do reside on the operating system, you start with a two-letter trail file abbreviation and then a nine-digit sequential value. So, you almost look at it as like an archive log from Oracle, where we have a prefix and then an affix, which is numeric. Same kind of thing. So, we have our two-letter, in this case, an ab, and then we have a nine-digit number. 08:47 Transform the way you work with Oracle Database 23ai! This cutting-edge technology brings the power of AI directly to your data, making it easier to build powerful applications and manage critical workloads. Want to learn more about Database 23ai? Visit mylearn.oracle.com to pick from our range of courses and enroll today! 09:12 Nikita: Welcome back! Ok, Nick. Let's get into the GoldenGate recovery process. Nick: When we start looking at the GoldenGate recovery process, it essentially makes GoldenGate kind of point-in-time like. So on that source database, you have your extract process that's going to be capturing data from the transaction logs. In the case of Oracle, the Oracle Database is actually going to be reading those transaction logs from us and passing the change records directly to GoldenGate. We call them an LCR, Logical Change Record. And so the integrated extract and GoldenGate, the extract portion tells the database, hey, I'm now going to be interested in the following list of tables. And it gives a list of tables to that internal component, the log mining engine within the database. And it says, OK, I'm now pulling data for those tables and I'm going to send you those table changes. And so as the extract process gets sent those changes, it's going to have checkpoint information. So not only does it know where it was pulling data from out of that source database, but what it's also writing to the trail file. The trail files themselves are all sequential and they have only committed data, as we talked about earlier. The distribution service has checkpoint information that says, hey, I know where I'm reading from in the previous trail file, and I know what I've sent across the network. The receiver service is the same thing. It knows what it's receiving, as well as what it's written to the trail file and the target system. The replicat also has a checkpoint. It knows where it's reading from in the trail file, and then it knows what it's been applying into that target database. This is where things start to become a little complicated. Our replicat process in most cases are parallel, so it'll have multiple threads applying data into that target database. Each of those threads is applying different transactions. And because of the way that the parallelism works in the replicat process, you can actually get situations where one replicat thread might be applying a transaction higher than another thread. And so you can eliminate that sequential or serial aspect of it, and we can get very high throughput speeds to the replicat. But it means that the checkpoint needs to be kind of smart enough to know how to rebuild itself if something fails. 11:32 Lois: Ok, sorry Nick, but can you go through that again? Maybe we can work backwards this time? Nick: If the replicat process fails, when it comes back up, it's going to look to its checkpoint tables inside that target database. These checkpoint tables keep track of where each thread was at when it crashed. And so when the replicat process restarts, it goes, oh, I was applying these threads at this location in these SCNs. It'll then go and read from the trail file and say, hey, let me rebuild that data and it only applies transactions that it hasn't applied yet to that target system. There is a synchronized replicat command as well that will tell a crashed replicat to say, hey, bring all your threads up to the same high watermark. It does that process automatically as it restarts and continues normal replication. But there is an option to do it just by itself too. So that's how the replicat kind of repairs and recovers itself. It'll simply look at the trail files. Now, let's say that the replicat crashed, and it goes to read from the trail files when it restarts and that trail profile is missing. It'll actually communicate to the distribution, or excuse me, to the receiver service and say, hey, receiver service, I don't have this trail file. Can you bring it back for me? And the receiver service will communicate downstream and say, hey, distribution service, I need you to resend me trail find number 6. And so the distribution service will resend that trail file so that the replicat can reprocess it. So it's often nice to have redundant environments with GoldenGate so we can have those trail files kind of around for availability. 13:13 Nikita: What if one of these files gets corrupted? Nick: If one of those trail files is corrupt, let's say that a trail file on the target site became corrupt and the replicat can't read from it for one reason or another. Simply stop the replicat process, delete the corrupt trail file, restart the replicat process, and now it's going to rebuild that trail file from scratch based on the information from the source GoldenGate environment. And so it's very recoverable. Handles it all very well. 13:40 Nikita: And can the extract process bounce back in the same way? Nick: The extract process can also recover in a similar way. So if the extract process crashes, when it restarts itself, there's a number of things that it does. The first thing is it has to rebuild any open transactions. So it keeps all sorts of checkpoint information about the oldest transaction that it's keeping track of, any open transactions that haven't been committed, and any other transactions that have been committed that it's already written to the trail file. So as it's reprocessing that data, it knows exactly what it's committed to trail and what hasn't been committed. And there's a number of ways that it does this. There's two main components here. One of them is called bounded recovery. Bounded recovery will allow you to set a time limit on transactions that span a certain length of time that they'll actually get flushed out to disk on that GoldenGate Hub. And that way it'll reduce the amount of time it takes GoldenGate to restart the extract process. And the other component is cache manager. Cache manager stores uncommitted transactions. And so it's a very elegant way of rebuilding itself from any kind of failure. You can also set up restart profiles so that if any process does crash, the GoldenGate service manager can automatically restart that service an x number of times across y time span. So if I say, hey, if my extract crashes, then attempt to restart it 100 times every 5 seconds. So there's a lot of things that you can do there to make it really nice and automatic repair itself and automatically resilient. 15:18 Lois: Well, that brings us to the end of this episode. Thank you, Nick, for going through the security strategies and recovery processes in such detail. Next week, we'll look at the installation of GoldenGate. Nikita: And if you want to learn more about the topics we discussed today, head over to mylearn.oracle.com and take a look at the Oracle GoldenGate 23ai Fundamentals course. Until next time, this is Nikita Abraham… Lois: And Lois Houston signing off! 15:44 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Avepoint (AVPT) had a strong quarter, with over 20% year-over-year growth in all three regions and customer segments. CFO Jim Caci credits the company's focus on profitable growth and controlling what it can in an uncertain environment. He also highlights the growing importance of data security, governance, and resilience, particularly in the Microsoft (MSFT), Alphabet (GOOGL), and Salesforce (CRM) environments where Avepoint operates.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
As enterprises double down on generative AI initiatives, the intersection of data security, privacy, and unstructured data is quickly becoming mission-critical. In this episode, Dimitri Sirota, Co-founder and CEO of BigID, joins the podcast to explore how AI transformation is reshaping enterprise data governance, security, and compliance—and why understanding your “crown jewel” data is essential to building trustworthy AI systems. Dimitri outlines the three major forces driving today's enterprise data challenges: accelerated cloud migration, a rising tide of global data privacy regulations, and the explosion of generative AI tools that rely on sensitive, unstructured data. He explains how enterprises can gain visibility into their AI programs and the data fueling them, mitigate shadow AI risks, and prepare for the next wave of agentic systems by adopting zero-trust models and real-time monitoring strategies. This episode is sponsored by BigID. Learn how BigID helps enterprises govern AI, mitigate data risk, and stay compliant here.
John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.
Unify and secure your data—no matter where it lives—without sacrificing control using OneLake security, part of Microsoft Fabric. With granular permissions down to the row, column, and table level, you can confidently manage access across engines like Power BI, Spark, and T-SQL, all from one place. Discover, label, and govern your data with clarity using the integrated OneLake catalog that surfaces the right items fast. Aaron Merrill, Microsoft Fabric Principal Program Manager, shows how you can stay in control, from security to discoverability—owning, sharing, and protecting data on your terms. ► QUICK LINKS: 00:00 - OneLake & Microsoft Fabric core concepts 01:28 - Table level security 02:11 - Column level security 03:06 - Power BI report 03:28 - Row level security 04:23 - Data classification options 05:19 - OneLake catalog 06:22 - View and manage data 06:48 - Governance 07:36 - Microsoft Fabric integration 07:59 - Wrap up ► Link References Check out our blog at https://aka.ms/OneLakeSecurity Sign up for a 60-day free trial at https://fabric.microsoft.com ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Stay in control as GenAI adoption accelerates across your organization using Data Security Posture Management for AI in Microsoft Purview. With built-in visibility into how AI apps and agents interact with sensitive data—whether inside Microsoft 365 or across unmanaged consumer tools—you can detect risks early, take decisive action, and enforce the right protections without slowing innovation. Monitor usage trends, investigate prompts and responses, and respond to potential data oversharing or policy violations in real time. From compliance-ready audit logs to adaptive data protection, you'll have the insights and tools to keep data secure as AI becomes a part of everyday work. Shilpa Ranganathan, Microsoft Purview Principal Group PM, shares how to balance GenAI innovation with enterprise-grade data governance and security. ► QUICK LINKS: 00:00 - GenAI app security, governance, & compliance 01:30 - Take Action with DSPM for AI 02:08 - Activity logging 02:32 - Control beyond Microsoft services 03:09 - Use DSPM for AI to monitor data risk 05:06 - ChatGPT Enterprise 05:36 - Set AI Agent guardrails using DSPM for AI 06:44 - Data oversharing 08:30 - Audit logs 09:19 - Wrap up ► Link References Check out https://aka.ms/SecureGovernAI ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
✨ Heads up! This episode features a demonstration of the SnapLogic UI and its AI Agent Creator towards the end. For the full visual experience, check out the video version on the Spotify app! ✨(Episode Summary)Tired of tangled data spread across multiple clouds, on-premise systems, and the edge? In this episode, MongoDB's Shane McAllister sits down with Peter Ngai, Principal Architect at SnapLogic, to explore the future of data integration and management in today's complex tech landscape.Dive into the challenges and solutions surrounding modern data architecture, including:Navigating the complexities of multi-cloud and hybrid cloud environments.The secrets to building flexible, resilient data ecosystems that avoid vendor lock-in.Strategies for seamless data integration and connecting disparate applications using low-code/no-code platforms like SnapLogic.Meeting critical data compliance, security, and sovereignty demands (think GDPR, HIPAA, etc.).How AI is revolutionizing data automation and providing faster access to insights (featuring SnapLogic's Agent Creator).The powerful synergy between SnapLogic and MongoDB, leveraging MongoDB both internally and for customer integrations.Real-world applications, from IoT data processing to simplifying enterprise workflows.Whether you're an IT leader, data engineer, business analyst, or simply curious about cloud strategy, iPaaS solutions, AI in business, or simplifying your data stack, Peter offers invaluable insights into making data connectivity a driver, not a barrier, for innovation.-Keywords: Data Integration, Multi-Cloud, Hybrid Cloud, Edge Computing, SnapLogic, MongoDB, AI, Artificial Intelligence, Data Automation, iPaaS, Low-Code, No-Code, Data Architecture, Data Management, Cloud Data, Enterprise Data, API Integration, Data Compliance, Data Sovereignty, Data Security, Business Automation, ETL, ELT, Tech Stack Simplification, Peter Ngai, Shane McAllister.
Could your routine data transfers now violate federal law? The DOJ's new Data Security Program (DSP) targets the flow of U.S. sensitive personal and government data to foreign adversaries — and the clock is ticking. In this episode of Corruption, Crime and Compliance, Michael Volkov breaks down the Justice Department's sweeping new Data Security Program, enacted under Executive Order 14117 and finalized in January 2025.You'll hear him discuss:The origins of the DSP, created through Executive Order 14117 under the Trump Administration, and the key national security concerns it addresses.What constitutes a “covered data transaction” and the thresholds for U.S. personal and government data that trigger compliance obligations.The list of “countries of concern” and what it means for companies doing business with entities tied to these regions.The types of U.S. data covered by the DSP, including biometric, genomic, financial, and geolocation data, and the specific quantity thresholds that trigger restrictions.Why data brokerage and bulk human genomic data transactions are prohibited outright, raising new compliance challenges for affected industries.How “restricted transactions” like cloud computing services and vendor agreements are subject to conditional exceptions under the DSP.The critical actions U.S. companies must take during the 90-day enforcement hiatus, including vendor assessments, renegotiations, and compliance system updates before the July 8th deadline.ResourcesMichael Volkov on LinkedIn | TwitterThe Volkov Law Group
Dr. Avishkar Misra shares his expertise on implementing AI effectively in businesses and explains how his company Berrijam is making AI accessible, explainable, and useful for organizations of all sizes.• AI is not just one solution but a set of tools, techniques, and frameworks that allows for intelligent decision-making at various scales• Berrijam offers three main services: AI strategy development, custom AI implementation, and their proprietary BerryJam AI focused on analytical applications• The Berrijam AI5C framework breaks down AI capabilities into five areas: Find, Make, Connect, Predict, and Optimize• Organizations need to start with their specific pain points and business requirements before selecting AI tools or implementation strategies• AI will transform jobs rather than simply eliminate them, creating opportunities for those who learn to work alongside AI• Leadership plays a critical role in successful AI adoption by fostering the right cultural framework and strategic approach• The future workplace will see AI handling mundane tasks, allowing professionals to focus on higher-value creative work• The IPX-hosted AI Readiness Workshops will help participants understand AI fundamentals, build business cases, and develop implementation strategiesStay in touch with us! Follow us on social: LinkedIn, Twitter, Facebook Contact us for info on IpX or for interest in being a podcast guest: info@ipxhq.com All podcasts produced by Elevate Media Group.
In Episode S7E7, Steven welcomes Glenn Day, CEO of NVISIONx, to discuss data risk intelligence and emerging threats in the age of AI and complex data environments. Glenn shares insights on data governance, the importance of proper data organization for AI adoption, and how NVISIONx helps organizations manage and purge data responsibly. The conversation underscores the significance of intelligent data classification in cybersecurity and the need for collaborative data governance across departments to achieve enhanced protection, compliance, and a competitive edge through AI models.
What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf
What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf
Navigating AI in IT Consulting: Insights from Michael Thomsen In this episode of Command Control Power, hosts welcome Michael Thomsen of Origin 84, dialing in from Australia. Michael shares critical insights into the use of AI in IT consulting. Topics range from the pros and cons of binge-listening to tech podcasts to the practical uses of AI tools like ChatGPT and Google's Gemini. Michael emphasizes the importance of balancing automation with human interaction, sharing examples of how AI can enhance efficiency, such as generating meeting summaries, handling complex client requests, and improving ticketing systems. The discussion also touches on the risks of data leakage, the necessity of well-defined policies, and the future implications of AI in both enhancing productivity and posing security challenges. 00:00 Introduction and Guest Welcome 00:36 Listener Feedback and Follow-Up 02:41 AI Tools in Daily Work 05:51 AI Integration in Business 09:08 Real-World AI Use Cases 13:52 Challenges and Best Practices with AI 23:50 AI in Education and Policy 27:22 Understanding AI Policies and Data Leakage 28:28 Balancing AI Empowerment and Security Risks 29:21 Credential Stuffing and Security Examples 30:49 Implementing Effective AI Policies 32:10 Microsoft Tools for Data Security 35:03 Challenges in Modern Security Practices 39:14 Leveraging AI for Productivity 42:09 AI in Client Communication and Ticketing 47:48 The Human Element in AI Integration 51:32 Concluding Thoughts on AI and Security
Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. Join our host Caleb Tolin and Head of Rubrik Zero Labs Joe Hladik as they dive deep into the evolving landscape of cybersecurity, from incident response to emerging threats. Joe shares insights from two decades of experience, including his work on high-profile cases like the SolarWinds breach, and breaks down the complex relationship between nation-state actors and cybercrime. Learn about the challenges of data sprawl, identity management, and why treating identity as the new perimeter isn't as simple as it seems. Joe also shares insights into the new report from Rubrik Zero Labs, The State of Data Security: A Distributed Crisis. Whether you're a security practitioner or executive, this episode offers valuable perspectives on data security posture management and the future of threat detection.
Use Microsoft Purview and Microsoft 365 Copilot together to build a secure, enterprise-ready foundation for generative AI. Apply existing data protection and compliance controls, gain visibility into AI usage, and reduce risk from oversharing or insider threats. Classify, restrict, and monitor sensitive data used in Copilot interactions. Investigate risky behavior, enforce dynamic policies, and block inappropriate use—all from within your Microsoft 365 environment. Erica Toelle, Microsoft Purview Senior Product Manager, shares how to implement these controls and proactively manage data risks in Copilot deployments. ► QUICK LINKS: 00:00 - Microsoft Purview controls for Microsoft 365 Copilot 00:32 - Copilot security and privacy basics 01:47 - Built-in activity logging 02:24 - Discover and Prevent Data Loss with DSPM for AI 04:18 - Protect sensitive data in AI interactions 05:08 - Insider Risk Management 05:12 - Monitor and act on inappropriate AI use 07:14 - Wrap up ► Link References Check out https://aka.ms/M365CopilotwithPurview Watch our show on oversharing at https://aka.ms/OversharingMechanics ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Lindsay and Tim discuss the implications of new border control regulations affecting Canadians traveling to the U.S. They explore the impact of these changes on travel preferences, the economy, and the challenges faced by content creators at the border. The episode features a story about a photographer's experience with border regulations and insights from immigration experts, culminating in a discussion about environmental initiatives related to border control. In this episode, the conversation delves into the complexities of traveling across the US-Canada border, particularly for Canadians. The speakers discuss the shift in travel motivations, the rights and powers of border officials, and the implications of discrimination at the border. They also explore the legalities surrounding work permits and the risks associated with crossing borders for work without proper documentation. Practical tips for travellers, especially photographers, are provided to navigate these challenges effectively. In this episode, the hosts discuss the intricacies of traveling as a photographer, focusing on privacy concerns, customs regulations, and the ethical dilemmas faced when crossing borders with equipment. They share personal anecdotes, including a cautionary tale about a friend who faced serious consequences due to his actions while traveling for work. The conversation highlights the importance of understanding border security protocols and the implications of carrying new gear, as well as the psychological attachment to packaging and the need for ethical behaviour in the photography industry. Want us to feature your question, photography story, or industry hot take on an episode? Send us a DM, voice note, or video on instagram @TheShootYourShotPodcast. Your privacy is important to us. If you want to remain anonymous just let us know :) Sign up with Imagen AI to streamline your photo editing and get 1500 edits free! Sign up below for this rad AF offer: https://tinyurl.com/mt46dz6n Become an IG reel-creating machine with Social Templates! with Promo code: LINDSAY. socialtemplates.co/lindsay Chapters 00:00 Introduction to Border Control and Its Relevance 04:00 Impact on Canadian Travelers and Economy 07:58 Content Creation and Border Control Challenges 11:49 Environmental Initiatives and Border Regulations 16:00 Summary of Key Takeaways and Closing Thoughts 17:24 Traveling Across Borders: The New Normal 18:35 Understanding Border Powers and Rights 21:00 The Reality of Border Searches and Detentions 24:42 Discrimination at the Border: A Personal Perspective 27:00 Navigating Legalities of Cross-Border Work 30:31 The Risks of Working Without a Visa 32:50 Tips for Traveling as a Tourist with Gear 35:27 Navigating Privacy and Data Security at Borders 36:50 Understanding Border Agent Scrutiny for Photographers 38:44 Traveling with Equipment: What to Know 40:00 Crossing Borders: Regulations for Photographers 41:43 The Dilemma of New Gear and Customs 43:30 The Psychological Attachment to Packaging 45:19 A Cautionary Tale: The Photographer's Misadventures 51:33 Lessons Learned: Ethics and Border Security
Yaki Faitelson is the co-founder and CEO at Varonis. In this episode, he joins host Amanda Glassner to discuss Varonis' AI-powered data security platform, including what CISOs across the industry are saying and whether their goalposts have shifted, as well as how cybersecurity teams of all sizes can address new threats, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://Varonis.com.
In today's episode, we discuss effective back-office integrations in transportation, data processing, and the risks of automation and data security with Sean Smith of Denim! Sean highlights how integrations can help with operational efficiency, reduce errors, and ensure confidence, as well as best practices to minimize risks, such as using different credentials for automation, data limitation, and multi-layer verification due to threats like deepfakes! About Sean Smith Sean Smith, VP of Product at Denim, has spent 10 years building and scaling products in the financial services and logistics industries. While leading Product at Denim, he has pioneered new capabilities for the factoring space including risk automation and pricing. Sean has also led work on our client dashboard, job management and collaboration that have revolutionized the process and workflow for broker clients looking to save time on back office operations. He excels at combining his passion for technology with the ability to drive impact on a balance sheet. Connect with Sean Website: https://www.denim.com/ LinkedIn: https://www.linkedin.com/in/smithseanp/ Twitter (X): https://x.com/smithseanp
This week on DisrupTV, we interviewed Bruno Kurtic, CEO/Co-founder of Bedrock Security, previously Co-founder of Sumo Logic and Shanda Gore, founder of Mays Associates and author of The PinLeader Path: Identify, Engage, and Develop Effective Human and AI Leadership for Your Organizational Culture. Bruno discussed the convergence of AI and data security, emphasizing the importance of AI governance and the need for enterprises to center data in their security strategies. He highlighted Bedrock Security's metadata lake, which uses AI to classify and manage data at scale, addressing regulatory concerns and improving data security posture. Shanda shared insights on effective leadership in the age of AI, stressing the importance of human-AI collaboration, critical thinking, and ethical AI use. Both guests underscored the evolving landscape of leadership and the necessity for organizations to adapt to AI's growing influence. DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. Brought to you by Constellation Executive Network: constellationr.com/CEN.
We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook Show Notes: https://securityweekly.com/esw-402
Episode 13 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Dr. Sonika Johri, Founder and CEO of Coherent Computing, to dive deep into the revolutionary world of quantum computing. Dr. Johri, a physicist with a PhD in condensed matter physics from Princeton University, takes us on her journey from engineering physics at IIT Delhi to becoming a leading figure in the quantum industry, having worked at Intel and IonQ.Sonika explains the core concepts of quantum computing—superposition, entanglement, and the quantum state space—and how they fundamentally change how we approach complex problems in fields like chemistry, material science, and AI. She discusses the future potential of quantum technologies, including the exciting prospects for Quantum AI and the shift in programming paradigms as we move from low-level machine code to higher-level abstractions.They also cover: The evolution of quantum hardware: From small qubits to scaling quantum systemsWhat makes quantum computing different from classical computingThe intersection of quantum computing and artificial intelligence Sonika's mission to democratize quantum through Coherent ComputingThe current state of quantum software and the tools that will shape the futureThis episode offers insights into quantum computing, AI, and how these emerging technologies will reshape the future of computing. Whether you're a tech enthusiast, developer, or entrepreneur, this conversation is a must-listen for anyone curious about the next frontier in technology.Key Topics & Timestamps:[00:00] – Introduction to Dr. Sonika Johri & Her Journey into Quantum Tech[03:00] – Sonika's early influences: Einstein and IIT Delhi[06:30] – Understanding Condensed Matter Physics[12:00] – Quantum Computing vs Classical Computing[20:00] – How Quantum Can Solve Complex Problems (Chemistry, Optimization, AI)[28:00] – Quantum Hardware: The Role of Qubits and Their Physical Realization[35:00] – Programming Quantum Computers: From Low-Level Gates to High-Level Abstractions[43:00] – Building Quantum Applications: Real-World Use Cases from IonQ and Coherent Computing[52:00] – The Future of Quantum AI: Machine Learning and Quantum Reasoning[1:00:00] – Quantum's Impact on Cryptography and Data Security[1:05:00] – The Mission of Coherent Computing: Making Quantum Accessible[1:12:00] – Looking Ahead: Future Episodes on Quantum Computing and AI[1:20:00] – Wrap-Up and Final ThoughtsHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Dr. Sonika Johri: Founder and CEO of Coherent Computing, a quantum software startup aiming to make quantum models accessible through developer-friendly tools. Formerly at Intel and IonQ, Sonika brings her experience in building quantum software and applications for industries like finance, chemistry, and optimization.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XDr. Sonika Johri: LinkedIn | XHave questions or thoughts on quantum computing? Drop us a mail at EffortlessPodcastHQ@gmail.comDon't forget to like, comment, and subscribe for more deep dives into the future of technology, AI, and quantum computing!
How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918
In this episode of Hotel Moment, Bryson Koehler, CEO of Revinate, sits down with Matthijs Welle, CEO of Mews, to discuss the rapidly evolving landscape of hotel data security. Matthijs shares insights on how cybercriminals are becoming increasingly sophisticated in their tactics, and why education is the hotel industry's strongest defense against data breaches. From phishing attempts to AdWord exploitation, they explore practical strategies for protecting guest data and the importance of building a security-focused culture within hotel operations. This conversation offers valuable guidance for hoteliers looking to strengthen their security practices while maximizing the benefits of their technology stack.
Protect your organization's data with Microsoft Purview. Gain complete visibility into potential data leaks, from AI applications to unmanaged cloud services, and take immediate action to prevent unwanted data sharing. Microsoft Purview unifies data security controls across Microsoft 365 apps, the Edge browser, Windows and macOS endpoints, and even network communications over HTTPS —all in one place. Take control of your data security with automated risk insights, real-time policy enforcement, and seamless management across apps and devices. Strengthen compliance, block unauthorized transfers, and streamline policy creation to stay ahead of evolving threats. Roberto Yglesias, Microsoft Purview Principal GPM, goes beyond Data Loss Prevention (DLP) and shows how to ensure your data stays protected no matter where it goes. ► QUICK LINKS: 00:00 - Data Loss Prevention in Microsoft Purview 01:33 - Assess DLP Policies with DSPM 03:10 - DLP across apps and endpoints 04:13 - Unmanaged cloud apps in Edge browser 04:39 - Block file transfers across endpoints 05:27 - Network capabilities 06:41 - Updates for policy creation 08:58 - New options 09:36 - Wrap up ► Link References Get started at https://aka.ms/PurviewDLPUpdates ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
In this episode of Grow a Small Business, host Troy Trewin interviews Dr. Donna Smith Bellinger, founder of DS Bellinger Consulting, specializes in helping business owners and sales teams enhance their sales performance by mastering revenue-generating conversations. She launched the business part-time nine years ago, growing it into a thriving enterprise with a team of five and multiple six-figure revenues. Dr. Bellinger also brings a wealth of entrepreneurial experience, including successfully exiting a tech company. In this discussion, she shares her journey, the challenges she faced as a woman and a person of color, the critical role of financial literacy, the art of delegation, and the importance of fostering a strong business culture. Other Resources: Sales Is Not About Wait And See: Do You Want To Get Paid Now or Eventually? by Dr. Donna Smith Bellinger (Author) You Lost Me @ Hello: Actionable principles that move you beyond "Networking." by Dr. Donna Smith Bellinger (Author) Why would you wait any longer to start living the lifestyle you signed up for? Balance your health, wealth, relationships and business growth. And focus your time and energy and make the most of this year. Let's get into it by clicking here. Troy delves into our guest's startup journey, their perception of success, industry reconsideration, and the pivotal stress point during business expansion. They discuss the joys of small business growth, vital entrepreneurial habits, and strategies for team building, encompassing wins, blunders, and invaluable advice. And a snapshot of the final five Grow A Small Business Questions: What do you think is the hardest thing in growing a small business? According to Dr. Donna Smith Bellinger, the hardest thing about growing a small business is understanding your value statement. She emphasises not trying to be all things to all people within your area of expertise. You simply cannot please everyone, so it is best to focus on what you do best and excel at that. What's your favorite business book that has helped you the most? According to Dr. Donna Smith Bellinger, her favourite business book that has helped her the most is The E Myth. However, she also mentions that The Purpose Driven Life, while not a business book, was very important to her. Therefore, she highlights two books as being particularly impactful. Are there any great podcasts or online learning resources you'd recommend to help grow a small business? Dr. Donna Smith Bellinger, doesn't recommend specific podcasts or online learning tools. Instead, she emphasises the importance of tailored research within the specific industry of a new client to remain relevant. She takes "a little bit of everything" for her own professional development. The host, Troy Trewin, suggests the Grow Small Business podcast itself as a helpful resource. What tool or resource would you recommend to grow a small business? She recommends the most direct tool recommendation for growing a small business is to have a good, robust CRM (Customer Relationship Management) system. She states that the days of just using a spreadsheet are over. What advice would you give yourself on day one of starting out in business? Her advice for herself on day one of starting out in business would be straightforward: "If you can't laugh at it, don't do it" Book a 20-minute Growth Chat with Troy Trewin to see if you qualify for our upcoming course. Don't miss out on this opportunity to take your small business to new heights! Enjoyed the podcast? Please leave a review on iTunes or your preferred platform. Your feedback helps more small business owners discover our podcast and embark on their business growth journey. Quotable quotes from our special Grow A Small Business podcast guest: Confidence is your most powerful sales strategy—own it before you pitch it – Dr. Donna Smith Bellinger Revenue generation starts with a mindset, not a marketing plan – Dr. Donna Smith Bellinger Stop asking for permission to succeed—just go get it – Dr. Donna Smith Bellinger
In this episode, Sam, Asad, and AJ sit down with Ben Kus, Chief Technology Officer at Box, to unpack how AI is reshaping enterprise tech—from the seismic shift to cloud-native infrastructure to the rise of AI agents that collaborate across platforms. We dive into the realities of leading through volatility, why AI adoption is moving faster than past platform shifts, and how enterprises can navigate the “FOMO” of generative AI without sacrificing trust. Plus, Ben's take on the future of software engineering, the myth of “non-technical founders,” and the books that keep him thinking ahead.Thanks for tuning in! Want more content from Pavilion? You're invited! Join the free Topline Slack channel to connect with 600+ revenue leaders, share insights, and keep the conversation going beyond the podcast!Subscribe to the Topline Newsletter to get the latest industry developments and emerging go-to-market trends delivered to your inbox every Thursday.Tune into The Revenue Leadership Podcast with Kyle Norton every Wednesday. Kyle dives deep into the strategies and tactics that drive success for revenue leaders like Jason Lemkins of SaaStr, Stevie Case of Vanta, and Ron Gabrisko of Databricks.Key Moments:[01:14] – Meet Ben Kus: Box's AI Visionary[05:26] – Leading Through Volatility: COVID, ZIRP, and AI's Sudden Rise[11:57] – Why AI Adoption Is Moving Faster Than Cloud or Mobile[17:05] – Data Security in the Age of AI: Box's Guardrails[24:17] – AI Agents: The Next Frontier (or Hype)?[31:41] – Open vs. Walled Gardens: The Future of Enterprise Platforms[38:45] – Is Software Engineering Still a Valuable Skill?[46:33] – Stagnation, Patience, and the Long Game
What if the next big leap in technology isn't just another gadget, but a transformative bridge to a smarter, more efficient future? In this eye-opening episode of Thrive LouD with Lou Diamond, meet Edward Crump, the remarkable inventor of Amazon Alexa and a significant force behind innovation at companies like Netflix and Nike. Now serving as the CTO of Champion Venture Partners, Crump shares the secrets behind his incredible journey through technology and entrepreneurship. Key Highlights: Discover how a lifelong technologist like Ed Crump started his career by selling his first program at the age of 12 and eventually played a pivotal role in creating Amazon Alexa. Learn about the pioneering projects he led at major companies like Netflix and Nike, and how he transitioned to the venture capital world with Champion Venture Partners. Gain insights into Crump's vision for the future, where personal AIs and smart environments revolutionize our daily lives while respecting data privacy. Understand the importance of interdisciplinary collaboration, as demonstrated by Champion Venture Partners, in driving innovative solutions in sports science, health, and wellness. Join Lou Diamond and Ed Crump on this enlightening exploration into the future of technology and innovation, and discover how you can be a part of this thrilling journey. TIMESTAMPED OVERVIEW 00:00 Entrepreneurial Journey: From Startups to Amazon 06:36 Tech Giants' Race: Amazon Outpaces Apple 09:52 Leveraging Innovation in Digital Experiences 10:40 Future of Personal AI and Data 14:17 Data Privacy Concerns in AI 19:57 New Venture Collaboration Insights 21:20 "Unique Access to Sports Ecosystem" 25:48 "Passion for Management Collaboration" 28:40 "Digital Twins: A Matrix Parallel" 30:52 Sugar-Free Mental Clarity 35:44 "Ed Crump: Coolest Guest Spotlight" Connect with Ed Check out Champion Venture Partners company's website Follow Us:
The Gene Simmons of Data P rotection: Protegrity's KISS MethodToday, we are kicking off a new series on the podcast, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: KISS (Keep It Simple, Stupid): A Data Security Dilemma with James RiceIn this episode, we are talking with James Rice, VP at Protegrity. He is going to help us strip away the nonsense, when it comes to securing data, and help us understand why we don't need a fortress... just a kill switch. While companies throw billions at firewalls, AI driven threat detection, and fortress like defenses - attackers still find their way in. James reminds us to keep it simple, with Protegrity's KISS Method which stands for Keep It Simple Stupid - and how when data is useless to attackers, breaches become mere inconveniences instead of existential threats.Questions:What exactly is the KISS method, and how does it apply to cybersecurity?Why are traditional cybersecurity approaches failing to stop breaches?What are some of the biggest myths about security that lead businesses to waste money on ineffective defenses?How do encryption, tokenization, and de-identification work together to make stolen data useless?Can you share an example where a company's focus on complex security backfired, and how a simpler approach could have helped?What's the biggest pushback you hear from companies hesitant to adopt a simpler, data-first security model? If a company wanted to implement the KISS method tomorrow, what are the first three steps they should take?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/jamesrice1/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
The hosts opened the show by discussion Rivian's “micromobility” operation, which was recently spun off from the parent company. "ALSO," as the new concern is called, is headquartered in California, and will focus on designing and building e-bikes, scooters, and other small electric vehicles. Tom also briefly addressed the tariff situation, which is likely to become much bigger news in the next day or so. The hosts also lamented the violence being wrought upon Tesla cars and showrooms. Tom expressed his surprise regarding the general excellence of the new-for-2025 Kia K4 small sedan. A replacement for the brand's Forte model, the K4 is efficient, fun to drive, and also surprisingly affordable. Jill reviewed the 2025 Lexus NX 450h+, a plug-in hybrid version of the Japanese luxury carmaker's compact crossover. Though Jill balked at the price, her impressions were mostly positive. Listen in for her full review. In the second segment, Jill and Tom welcome Derek Kravitz of Consumer Reports to the show. Derek shared research conducted by Consumer Reports regarding car data privacy, and what consumers can do to protect themselves from makers sharing their personal information. In the last segment, Jill is subjected to Tom's “Fake Paint” quiz.
In this episode we are looking at a sector where IT and tech innovation is taking efficiency to a whole new level - manufacturing.Manufacturing is in a precarious position as an industry. In the global north, growth is largely stagnant, according to those same UN statistics. Even in high-growth economies like China, it's slowing down. It's also notoriously inefficient. So, can tech help? And if so, what does that look like? Joining us to discuss is Dan Klein, an advisor on data and digital transformation with a special interest in the manufacturing sector.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Dan Klein: https://www.linkedin.com/in/dplklein/?originalSubdomain=uk Sources cited in this week's episode: UN stats on the state of global manufacturing: https://stat.unido.org/portal/storage/file/publications/qiip/World_Manufacturing_Production_2024_Q1.pdfStatista report on global manufacturing and efficiency: https://www.statista.com/outlook/io/manufacturing/worldwide Water on Mars: https://pubs.geoscienceworld.org/gsa/geology/article/52/12/939/648640/Seismic-discontinuity-in-the-Martian-crust
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode we are looking at a sector where IT and tech innovation is taking efficiency to a whole new level - manufacturing.Manufacturing is in a precarious position as an industry. In the global north, growth is largely stagnant, according to those same UN statistics. Even in high-growth economies like China, it's slowing down. It's also notoriously inefficient. So, can tech help? And if so, what does that look like? Joining us to discuss is Dan Klein, an advisor on data and digital transformation with a special interest in the manufacturing sector.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Dan Klein: https://www.linkedin.com/in/dplklein/?originalSubdomain=uk Sources cited in this week's episode: UN stats on the state of global manufacturing: https://stat.unido.org/portal/storage/file/publications/qiip/World_Manufacturing_Production_2024_Q1.pdfStatista report on global manufacturing and efficiency: https://www.statista.com/outlook/io/manufacturing/worldwide Water on Mars: https://pubs.geoscienceworld.org/gsa/geology/article/52/12/939/648640/Seismic-discontinuity-in-the-Martian-crust
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a recent ransomware attack on the Penn-Harris-Madison school district in Indiana, including a broader look at how cyberattacks are impacting K-12 schools across the country. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions In this episode of 'Cybersecurity Today,' host Jim Love discusses the rising trends and severe impacts of cyber attacks on K-12 schools with Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security (CIS). They scrutinize recent studies showing a surge in cyber threats targeting educational institutions, emphasizing the vulnerability of schools and the motives behind these attacks. The discussion covers how cyber criminals exploit budgetary information and schedules to maximize impact, the profound repercussions of ransomware attacks on school communities, and the critical need for better cybersecurity practices and support. Randy Rose shares insights from the 2025 CIS MS-ISAC K-12 Cybersecurity Report and offers practical advice on elevating security standards and fostering community resilience to protect sensitive school data from cyber threats. 00:00 Introduction to Cybersecurity in Schools 00:02 Iconic Hacking Movies and Real-Life Cyber Threats 00:41 The Seriousness of School Cybersecurity 01:10 Interview with Randy Rose: Introduction and CIS Overview 01:40 CIS's Role and Randy's Journey 03:27 Supporting Various Organizations 04:26 Challenges Faced by Schools and Local Governments 06:21 Cybersecurity Threats and Attack Patterns 09:11 Impact of Cyber Attacks on Schools 13:22 Detailed Findings from the CIS Report 19:16 Human Factor in Cybersecurity 19:29 Supply Chain and Data Security 27:13 The Role of AI in Cybersecurity 30:49 Ransomware and Its Devastating Effects 32:27 Recommendations for Improving School Cybersecurity 34:01 Conclusion and Final Thoughts
The global race for AI leadership is no longer just about companies—it's about nations. AI isn't just computing infrastructure; it's cultural infrastructure, economic strategy, and national security all rolled into one.In this episode, Jensen Huang, founder and CEO of NVIDIA, and Arthur Mensch, cofounder and CEO of Mistral, sit down to discuss sovereign AI, national AI strategies, and why every country must take ownership of its digital intelligence.How AI will reshape global economies and GDPThe full AI stack—from chips to models to AI factoriesWhy AI is both a general purpose technology and deeply specializedThe open-source vs. closed AI debate and its impact on sovereigntyWhy no one will build AI for you—you have to do it yourselfIs this the most consequential technology shift of all time? If so, the stakes have never been higher.Resources: Find Arthur on X: https://x.com/arthurmenschFind Anjney on X: https://www.linkedin.com/in/anjney/Find NVIDIA on X: https://x.com/nvidiaFind Mistral: https://x.com/MistralAI Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
Episode Highlights with Dr. Erika GrayUnderstanding privacy concerns with genetic testing, especially in light of the security breach with a major DNA company recently Samples sent to testing companies are de-identified and not connected to personal dataSecurity concerns and how to make sure yours is safeHow their specific testing has layers of encryption and is not even mined for dataYou can use an alias on your genetic testing The limits of genetic testing and what it can and can't tell us Genetics is a screening tool and not a diagnostic tool — related to cancer risk and expressionMore related to choline and how this can be really beneficial for focus and attention Resources We MentionMy Toolbox Genomics - Use code wellnessmama for a discount