SlideShare a Scribd company logo
1
Preserving privacy
while sharing data
Gordon Haff
Emerging Technology Evangelist
@ghaff
https://bitmason.blogspot.com
September 2020
@ghaff https://bitmason.blogspot.com
2
Shared data can
accelerate innovation
and improve outcomes
in energy, telecoms,
healthcare...
The opportunity
@ghaff https://bitmason.blogspot.com
3
But data can be private
and sensitive at the
individual person or
organization level
The problem
@ghaff https://bitmason.blogspot.com
4
Source: Andrew Trask
@ghaff https://bitmason.blogspot.com
5
Anonymization
Removing/tokenizing personal
data fields
Encrypt/transform personal
data fields
Aggregation by trusted agency
@ghaff https://bitmason.blogspot.com
6
Does it work?
Sort of...
@ghaff https://bitmason.blogspot.com
7
What’s personal data?
Who can you really trust?
Lack of data diversity (e.g.
k-anonymity failures)
Susceptibility to attack
@ghaff https://bitmason.blogspot.com
8
@ghaff https://bitmason.blogspot.com
9
Reconstruction
Source: US Census
@ghaff https://bitmason.blogspot.com
10
Identification of patterns
Source: https://avtanski.net/
@ghaff https://bitmason.blogspot.com
11
Source: Privitar
Linkage attacks
@ghaff https://bitmason.blogspot.com
12
Re-identification
@ghaff https://bitmason.blogspot.com
13
US Census
@ghaff https://bitmason.blogspot.com
14
US Census
@ghaff https://bitmason.blogspot.com
15
Differential Privacy
Response to erosion of traditional Statistical
Disclosure Limitation (SDL) techniques
Widely share statistics over a set of data without
revealing anything about individuals
2006 Dwork, McSherry, Nissim, and Smith
(ε-differential privacy)
@ghaff https://bitmason.blogspot.com
16
Requirements
Formal model
Resist linkage attacks
Resist unknown future attacks
Effective in settings in which
extensive external information
may be available
@ghaff https://bitmason.blogspot.com
17
Injects random data into a data
set (in a mathematically rigorous
way) to protect individual privacy
Value of randomness trades off
privacy and utility/accuracy
https://www.accessnow.org/understanding-
differential-privacy-matters-digital-rights/
@ghaff https://bitmason.blogspot.com
18
@ghaff https://bitmason.blogspot.com
19
Limitations
Base rate
Noise
Repeated queries
@ghaff https://bitmason.blogspot.com
20
But what if you don’t
have a trusted
third-party?
@ghaff https://bitmason.blogspot.com
21
Multi-Party Computation
Collaborative analysis of silo-ed datasets
without trusting a third party
● Equivalence to incorruptible trusted party
● Parties jointly compute a function on their
inputs using a protocol
● No information is revealed about inputs
@ghaff https://bitmason.blogspot.com
22
Preserve privacy and correctness
Adversarial participants
Collusion
Threat models
Overhead
Considerations
@ghaff https://bitmason.blogspot.com
23
Protocol distributes encrypted
(AES) shares of (masked) data
Implementations and efficiency
depend on threat assumptions
In general, low compute but high
communications overhead
@ghaff https://bitmason.blogspot.com
24
Ongoing research
● Subscribe to:
https://research.redhat.com/quarterly/
● Boston University Red Hat Collaboratory
● openmined.org (PySyft)
CONFIDENTIAL Designator
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHat
25
Red Hat is the world’s leading provider of enterprise
open source software solutions. Award-winning support,
training, and consulting services make Red Hat a trusted
adviser to the Fortune 500.
Thank you

More Related Content

What's hot (11)

Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Walter Adamson
 
Fiverr Gig - South Florida News
Fiverr Gig - South Florida NewsFiverr Gig - South Florida News
Fiverr Gig - South Florida News
Lamar Morgan
 
Swap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked dataSwap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked data
Selver Softic
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
Sucuri
 
Twitter Ecosphere: Tools, Apps & Mash-Ups
Twitter Ecosphere: Tools, Apps & Mash-UpsTwitter Ecosphere: Tools, Apps & Mash-Ups
Twitter Ecosphere: Tools, Apps & Mash-Ups
Mindshare
 
TWITTER COUNTER REPORT
TWITTER COUNTER REPORTTWITTER COUNTER REPORT
TWITTER COUNTER REPORT
Checkmate Social Media
 
Facebook Scams
Facebook ScamsFacebook Scams
Facebook Scams
Kim Jensen
 
Can SAS be #1 in Social Media?
Can SAS be #1 in Social Media?Can SAS be #1 in Social Media?
Can SAS be #1 in Social Media?
Wayne Sutton
 
World Of Twit: Tools, Apps and Mash-Ups
World Of Twit: Tools, Apps and Mash-UpsWorld Of Twit: Tools, Apps and Mash-Ups
World Of Twit: Tools, Apps and Mash-Ups
Mindshare
 
News construction from microblogging posts using open data
News construction from microblogging posts using open data News construction from microblogging posts using open data
News construction from microblogging posts using open data
Francisco Berrizbeitia
 
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
Jeff Willinger
 
Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Kinship Digital ASX GN8 Compliance Monitoring Social Media Examples Crown New...
Walter Adamson
 
Fiverr Gig - South Florida News
Fiverr Gig - South Florida NewsFiverr Gig - South Florida News
Fiverr Gig - South Florida News
Lamar Morgan
 
Swap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked dataSwap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked data
Selver Softic
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
Sucuri
 
Twitter Ecosphere: Tools, Apps & Mash-Ups
Twitter Ecosphere: Tools, Apps & Mash-UpsTwitter Ecosphere: Tools, Apps & Mash-Ups
Twitter Ecosphere: Tools, Apps & Mash-Ups
Mindshare
 
Facebook Scams
Facebook ScamsFacebook Scams
Facebook Scams
Kim Jensen
 
Can SAS be #1 in Social Media?
Can SAS be #1 in Social Media?Can SAS be #1 in Social Media?
Can SAS be #1 in Social Media?
Wayne Sutton
 
World Of Twit: Tools, Apps and Mash-Ups
World Of Twit: Tools, Apps and Mash-UpsWorld Of Twit: Tools, Apps and Mash-Ups
World Of Twit: Tools, Apps and Mash-Ups
Mindshare
 
News construction from microblogging posts using open data
News construction from microblogging posts using open data News construction from microblogging posts using open data
News construction from microblogging posts using open data
Francisco Berrizbeitia
 
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
15 Social Media Secrets in 15 Minutes Digital Megaphone Social Media & PR Mon...
Jeff Willinger
 

Similar to Preserving privacy while sharing data (20)

Lightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyLightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising Privacy
Gordon Haff
 
chatgpt-privacy and security.pptx
chatgpt-privacy and security.pptxchatgpt-privacy and security.pptx
chatgpt-privacy and security.pptx
Deepak Kumar
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
Phil Pearce
 
5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True
Social Media Today
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
W. David Stephenson
 
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TravelMedia.ie
 
Most Profitable Cryptocurrency in 2023
Most Profitable Cryptocurrency in 2023Most Profitable Cryptocurrency in 2023
Most Profitable Cryptocurrency in 2023
InvestingTips
 
How Open Source is Eating Software: Numbers and Trends
How Open Source is Eating Software: Numbers and TrendsHow Open Source is Eating Software: Numbers and Trends
How Open Source is Eating Software: Numbers and Trends
All Things Open
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
Phil Cryer
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
Mary Aviles
 
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Michael Altendorf
 
@twitter Mining #Microblogs Using #Semantic Technologies
@twitter Mining #Microblogs Using #Semantic Technologies@twitter Mining #Microblogs Using #Semantic Technologies
@twitter Mining #Microblogs Using #Semantic Technologies
Martin Ebner
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcement
WilliamjohnesUK123
 
Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Talk at IAPP London May 2020: Competition, and why the GDPR is failing Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Johnny Ryan
 
The Business Owner's Guide to Data Protection & Security
The Business Owner's Guide to Data Protection & SecurityThe Business Owner's Guide to Data Protection & Security
The Business Owner's Guide to Data Protection & Security
tvgconsulting
 
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptxMichael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
TravelMedia.ie
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
Synopsys Software Integrity Group
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
Fahmi Albaheth
 
Keynote: 6 Steps to Big Data Success for Digital Marketing
Keynote: 6 Steps to Big Data Success for Digital MarketingKeynote: 6 Steps to Big Data Success for Digital Marketing
Keynote: 6 Steps to Big Data Success for Digital Marketing
Sameer Khan
 
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdfHow to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
Dina G
 
Lightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyLightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising Privacy
Gordon Haff
 
chatgpt-privacy and security.pptx
chatgpt-privacy and security.pptxchatgpt-privacy and security.pptx
chatgpt-privacy and security.pptx
Deepak Kumar
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
Phil Pearce
 
5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True5 BS Facts About Data Privacy Everyone Thinks Are True
5 BS Facts About Data Privacy Everyone Thinks Are True
Social Media Today
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
W. David Stephenson
 
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TBEX June 2022_Marbella_Michael Collins_Travelmedia.ie_What the FLoC_with typ...
TravelMedia.ie
 
Most Profitable Cryptocurrency in 2023
Most Profitable Cryptocurrency in 2023Most Profitable Cryptocurrency in 2023
Most Profitable Cryptocurrency in 2023
InvestingTips
 
How Open Source is Eating Software: Numbers and Trends
How Open Source is Eating Software: Numbers and TrendsHow Open Source is Eating Software: Numbers and Trends
How Open Source is Eating Software: Numbers and Trends
All Things Open
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
Phil Cryer
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
Mary Aviles
 
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Next big things in Intenet 2013 - Big Data, Social, Mobile and Real Time Pers...
Michael Altendorf
 
@twitter Mining #Microblogs Using #Semantic Technologies
@twitter Mining #Microblogs Using #Semantic Technologies@twitter Mining #Microblogs Using #Semantic Technologies
@twitter Mining #Microblogs Using #Semantic Technologies
Martin Ebner
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcement
WilliamjohnesUK123
 
Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Talk at IAPP London May 2020: Competition, and why the GDPR is failing Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Talk at IAPP London May 2020: Competition, and why the GDPR is failing
Johnny Ryan
 
The Business Owner's Guide to Data Protection & Security
The Business Owner's Guide to Data Protection & SecurityThe Business Owner's Guide to Data Protection & Security
The Business Owner's Guide to Data Protection & Security
tvgconsulting
 
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptxMichael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
Michael Collins_TravelMedia.ie_SATW Sept 2022_Bogota Colombia_presentation.pptx
TravelMedia.ie
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
Fahmi Albaheth
 
Keynote: 6 Steps to Big Data Success for Digital Marketing
Keynote: 6 Steps to Big Data Success for Digital MarketingKeynote: 6 Steps to Big Data Success for Digital Marketing
Keynote: 6 Steps to Big Data Success for Digital Marketing
Sameer Khan
 
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdfHow to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
Dina G
 

More from Gordon Haff (20)

Artificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine Learning
Gordon Haff
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101
Gordon Haff
 
Free and Open:An Historical Perspective
Free and Open:An Historical PerspectiveFree and Open:An Historical Perspective
Free and Open:An Historical Perspective
Gordon Haff
 
Why do we contribute (to open source)?
Why do we contribute (to open source)?Why do we contribute (to open source)?
Why do we contribute (to open source)?
Gordon Haff
 
How do you get started in AI?
How do you get started in AI?How do you get started in AI?
How do you get started in AI?
Gordon Haff
 
The good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIThe good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AI
Gordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native:  A New Ecosystem for Putting Containers into ProductionCloud-Native:  A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
Gordon Haff
 
Containers: Don't Skeu Them Up
Containers: Don't Skeu Them UpContainers: Don't Skeu Them Up
Containers: Don't Skeu Them Up
Gordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionCloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
Gordon Haff
 
DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018
Gordon Haff
 
AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018
Gordon Haff
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
Gordon Haff
 
Ten layers of container security for CloudCamp Nov 2017
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017
Gordon Haff
 
That's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successThat's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native success
Gordon Haff
 
The Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsThe Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing Operations
Gordon Haff
 
A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)
Gordon Haff
 
Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOps
Gordon Haff
 
Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.
Gordon Haff
 
Fail Fast, Fail Often
Fail Fast, Fail OftenFail Fast, Fail Often
Fail Fast, Fail Often
Gordon Haff
 
The New Platform: You Ain't Seen Nothing Yet
The New Platform: You Ain't Seen Nothing YetThe New Platform: You Ain't Seen Nothing Yet
The New Platform: You Ain't Seen Nothing Yet
Gordon Haff
 
Artificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine Learning
Gordon Haff
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101
Gordon Haff
 
Free and Open:An Historical Perspective
Free and Open:An Historical PerspectiveFree and Open:An Historical Perspective
Free and Open:An Historical Perspective
Gordon Haff
 
Why do we contribute (to open source)?
Why do we contribute (to open source)?Why do we contribute (to open source)?
Why do we contribute (to open source)?
Gordon Haff
 
How do you get started in AI?
How do you get started in AI?How do you get started in AI?
How do you get started in AI?
Gordon Haff
 
The good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIThe good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AI
Gordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native:  A New Ecosystem for Putting Containers into ProductionCloud-Native:  A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
Gordon Haff
 
Containers: Don't Skeu Them Up
Containers: Don't Skeu Them UpContainers: Don't Skeu Them Up
Containers: Don't Skeu Them Up
Gordon Haff
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionCloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
Gordon Haff
 
DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018
Gordon Haff
 
AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018
Gordon Haff
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
Gordon Haff
 
Ten layers of container security for CloudCamp Nov 2017
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017
Gordon Haff
 
That's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successThat's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native success
Gordon Haff
 
The Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsThe Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing Operations
Gordon Haff
 
A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)
Gordon Haff
 
Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOps
Gordon Haff
 
Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.
Gordon Haff
 
Fail Fast, Fail Often
Fail Fast, Fail OftenFail Fast, Fail Often
Fail Fast, Fail Often
Gordon Haff
 
The New Platform: You Ain't Seen Nothing Yet
The New Platform: You Ain't Seen Nothing YetThe New Platform: You Ain't Seen Nothing Yet
The New Platform: You Ain't Seen Nothing Yet
Gordon Haff
 

Recently uploaded (20)

Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 

Preserving privacy while sharing data