Ajethaa PandianAutomating data discovery, governance and security of Personally Identifiable Information (PII)Authors: Ajethaa Pandian, Suj Perepa4d ago
Abhijeet kumawat🛡️ Information Disclosure Vulnerability: Exposing API Keys and Tokens in a Private ProgramHello, everyone! 👋Sep 272
Krupesh DesaiinData View HouseData Privacy — Balancing Data Conformance and Performance for Internal Reporting.PII protection in internal reporting.Sep 11Sep 11
Nitin KumarFine-Tuning Large Language Models For Named Entity RecognitionIn this post, I summarize my experiences with fine-tuning Large Language Models for the problem of Named Entity Recognition (NER). The…Jan 254Jan 254
Parth ValaniBuilding a Data Cleanroom Solution for Cross-Selling Campaigns in Microsoft AzureIntroductionAug 23Aug 23
Ajethaa PandianAutomating data discovery, governance and security of Personally Identifiable Information (PII)Authors: Ajethaa Pandian, Suj Perepa4d ago
Abhijeet kumawat🛡️ Information Disclosure Vulnerability: Exposing API Keys and Tokens in a Private ProgramHello, everyone! 👋Sep 272
Krupesh DesaiinData View HouseData Privacy — Balancing Data Conformance and Performance for Internal Reporting.PII protection in internal reporting.Sep 11
Nitin KumarFine-Tuning Large Language Models For Named Entity RecognitionIn this post, I summarize my experiences with fine-tuning Large Language Models for the problem of Named Entity Recognition (NER). The…Jan 254
Parth ValaniBuilding a Data Cleanroom Solution for Cross-Selling Campaigns in Microsoft AzureIntroductionAug 23
priyadarshan patilininspiringbrillianceBuilding secure systems with PII Data Protection Techniques — Part IToday, storing a person’s KYC information, credit card/debit card information, or other similar sensitive details to charge for services…Feb 28, 2023
AdityapalTop 10 Generative AI Chatbots in 2024: Pioneering Ethical and Safe AIThe world of Generative AI chatbots is rapidly evolving, with new contenders entering the market every day. These chatbots are transforming…Aug 16
Arvind PantMasking PII (Personally Identifiable Information)As a data engineer, you’ve likely encountered databases or tables to which you do not have access without obtaining multiple approvals…May 29