Latest Posts
Technology Trends for 2024: A Glimpse into the Future
Based on insights from O'Reilly's learning platform usage, several key trends are emerging that will shape the industry in the coming year. Here’s a detailed look at these trends and what they mean for businesses and professionals. Software Development and Programming...
Most IT projects overun. We need to rethink planning and the assessment of risk
The Empirical Reality of IT Project Cost Overruns: Discovering A Power-Law Distribution is an actual data-driven piece of work on IT projects by Bent Flyvbjerg, Alexander Budzier, Jong Seok Lee, Mark Keil, Daniel Lunn & Dirk W. Bester. This team analysed 5,392 IT...
Google’s Secure AI Framework: Ensuring Robust and Safe AI Deployment
Artificial Intelligence (AI) is evolving at an unprecedented pace, necessitating robust risk management strategies. To address this need, Google has introduced the Secure AI Framework (SAIF), a comprehensive approach to securing AI systems. This framework comprises...
Developing an LLM using sensitive data? This is how to protect customers
Data Preprocessing and De-identification Tokenisation and Encryption Before feeding sensitive data into the LLM, implement tokenisation or encryption techniques to replace identifiable information with non-sensitive tokens. This preserves data utility while protecting...
Ethically Developing Software Using Sensitive Information: Anonymisation
Protecting individual privacy while leveraging data for innovation is a fine balance. Anonymisation is a key practice in ensuring data privacy, and understanding its principles and implementation is vital for developers. What is Anonymisation? Anonymisation is the...
Notes on implementing AI in businesses
Requirements for implementing AI in an organisation: Executive Sponsorship: Secure support from top management. Business Objectives: Clearly define goals and expectations. Realistic Expectations: Understand the timeline (3 to 36 months) and outcomes. Budget: Ensure...