This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
IoT Architectural Overview - 3 use case studies from InfluxData InfluxData
This SlideShare reviews how an IoT Data platform fits in with any IoT Architecture to manage the data requirements of every IoT implementation. It is based on the learnings from existing IoT practitioners that have adopted an IoT Data platform using InfluxData. These clients have a range of solutions–from home automation (thermostat monitoring & management), to infrastructure management (solar panel monitoring and control) to manufacturing (equipment monitoring & control) as well as environmental management (green wall monitoring & control).
These learnings will help IoT adopters avoid the common pitfalls current clients faced on their journey to developing their IoT solution.
The Data Platform for Today's Intelligent Applications.pdfNeo4j
Do you know how graph technology is used in today’s data-driven applications? We’ll get you up to speed and introduce you to the Neo4j product portfolio.
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
An introduction to Unstructured Data and the world of Vector Databases, we will see how they different from traditional databases. In which cases you need one and in which you probably don’t. I will also go over Similarity Search, where do you get vectors from and an example of a Vector Database Architecture.
Is a secure cloud possible or an neverending rat-race? We know the debate around “The Cloud Is Just Someone Else's Computer.” The cloud is an technology ecosystem that provided us so much more options than time-share mainframe, multi-user unix systems or patterns as CORBA and RPC could provide us. I'll introduce you into the concept of Variety known from Requisite Variety. One of the key attributes of an antifragile IT systems. This concept will help you in design decision on the risk mitigation in the cloud.
Big Data Fabric: A Recipe for Big Data InitiativesDenodo
Big data fabric combines essential big data capabilities in a single platform to automate the many facets of data discovery, preparation, curation, orchestration, and integration across a multitude of data sources. Attend this session to learn how Big Data Fabric enabled by data virtualization constitutes a recipe for:
• Enabling new actionable insights with minimal effort
• Securing big data end-to-end
• Addressing big data skillset scarcity
• Providing easy access to data without having to decipher various data formats
Agenda:
• Big Data with Data Virtualization
• Product Demonstration
• Summary & Next Steps
• Q&A
Watch webinar on demand here: https://goo.gl/EpmIBx
This webinar is part of the Data Virtualization Packed Lunch Webinar Series: https://goo.gl/W1BeCb
GraphSummit Milan & Stockholm - Neo4j: The Art of the Possible with GraphNeo4j
Dr Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GPT and Graph Data Science to power your Knowledge GraphNeo4j
In this workshop at Data Innovation Summit 2023, we demonstrated how you could learn from the network structure of a Knowledge Graph and use OpenAI’s GPT engine to populate and enhance your Knowledge Graph.
Key takeaways:
1. How Knowledge Graphs grow organically
2. How to deploy Graph Algorithms to learn from the topology of a graph
3. Integrate a Knowledge Graph with OpenAI’s GPT
4. Use Graph Node embeddings to feed Machine Learning workflow
Neo4j : L’art des Possibles avec la Technologie des GraphesNeo4j
Philip Rathle, CTO, Neo4j
Gartner prévoit que “d’ici 2025, les technologies de graphes seront utilisées dans 80 % des innovations en matière de données et d’analyse, contre 10 % en 2021, ce qui facilitera la prise de décision rapide dans toute l’entreprise “*. Cette session explique pourquoi.
10 predictions for cloud native in 2021 - Cheryl Hung GIFEE dayCheryl Hung
Cheryl Hung presented 10 predictions for cloud native technologies in 2021. These predictions are organized into three categories: tools, DevOps practices, and ecosystem trends. Some of the key predictions include increased use of Rust programming language in cloud projects, cross-cloud capabilities becoming more robust, GitOps and chaos engineering practices growing, and user-driven development of open source projects.
10 predictions for cloud native in 2021Cheryl Hung
Cheryl Hung presented 10 predictions for cloud native technologies in 2021. These included increased use of Rust programming language projects, better support for multi-cloud deployments, and using WebAssembly and eBPF for new capabilities. She also predicted growth in applying Kubernetes at the edge, increased adoption of GitOps for infrastructure management, and rising focus on chaos engineering practices and FinOps. Additional trends included more pluggable developer and operator tooling, consolidation in the service mesh market, and open source projects being increasingly driven by end user needs.
Leader in Cloud and Object Storage for Service ProvidersScality
Cloud-based services are growing as they become real opportunities for service providers. Discover more about Scality RING Software-Defined Object Storage. Learn more at www.scality.com.
Retrieval Augmented Generation (RAG), is a popular method to use a large language model, a vector database, and some sort of prompt interface to build better chat bots. On the surface, it seems pretty simple to build a RAG app, but when it comes down to implementation, there are many details to hash out. These details include how to: chunk data, work with embeddings, and even how to select and use a vector database.
The Peak of Data Integration Encore- Navigating Climate Change with Data Inno...Safe Software
Join us for an exclusive webinar that holds the key to unlocking climate solutions through cutting-edge data integration strategies. As organizations grapple with the urgent challenges posed by climate change, this encore presentation of the European Peak of Data Integration Conference’s top talks is your opportunity to gain actionable insights and drive meaningful change.
Talk 1: Shaping a Sustainable Future with the Cloud and GeoIT
Presented by Christian Elfers from con terra GmbH, FME Platinum Partner, this session paints a compelling vision of our future, driven by technological innovation. Explore the potential of open platforms, data-as-a-product, digital twins, and AI, and learn how these transformative advancements can be harnessed in the realm of GeoIT to combat climate change.
Talk 2: Empowering Sustainability: Location Intelligence for Renewable Energy Planning
Journey with Peter Veenstra from Pivvot as he traces the trajectory of data, from its origin to the actualization of renewable energy projects and pipelines—all expertly facilitated by FME. Gain profound insights into the pivotal role of location intelligence in shaping the future of renewable energy in North America, as it navigates geotechnical, environmental, cultural, and climate considerations.
By attending this webinar, you will equip yourself with invaluable perspectives on how data integration can be harnessed to address the pressing imperatives of climate change. Join us in bridging the worlds of innovation, technology, and sustainability in the face of climate uncertainty. Don't miss your chance to be at the forefront of climate action—reserve your seat today!
WSO2Con ASIA 2016: Planning Your Cloud StrategyWSO2
This session will explain why your organization needs a Cloud strategy and what you need to successfully implement it. It will also discuss how WSO2 can help you do this with key products such as WSO2 API Manager, WSO2 Enterprise Service Bus and its connectors, WSO2 Identity Server, and WSO2 Cloud Platform.
Neo4j GraphSummit Copenhagen - The Art Of The Possible With Graph Technology ...Neo4j
by Emil Eifrem, CEO at Neo4j
Gartner predicts that “By 2025, graph technologies will be used in 80% of data and analytics innovations, up from 10% in 2021, facilitating rapid decision making across the enterprise.”* This session will explain why.
Cisco Live: Containers on Enterprise Compute and NetworksMichael Duarte
Containers are the next evolutionary step in how applications are managed and consumed. Allowing application teams to control and optimize their application deployment process. Along with the advantages provided to application teams, it's also a dynamic shift for data center design. Allowing for better resource utilization, and management resulting in both cost savings and faster IT. This session will explain how Cisco IT has delivered this new paradigm in Cloud Technology by using Cisco ACI, Cisco UCS and open-source solutions like Kubernetes.
The Neo4j Data Platform for Today & Tomorrow.pdfNeo4j
The document discusses the Neo4j graph data platform. It highlights that connected data is growing exponentially and graphs are well-suited to model real-world relationships. Neo4j provides a native graph database, tools, and services to store, query, and analyze graph data. Key capabilities include high performance, flexible schemas, developer productivity, and supporting transactions and analytics workloads.
Similar to Building RAG with self-deployed Milvus vector database and Snowpark Container Services (20)
How CXAI Toolkit uses RAG for Intelligent Q&AZilliz
Manasi will be talking about RAG and how CXAI Toolkit uses RAG for Intelligent Q&A. She will go over what sets CXAI Toolkit's Intelligent Q&A apart from other Q&A systems, and how our trusted AI layer keeps customer data safe. She will also share some current challenges being faced by the team.
Multimodal Embeddings (continued) - South Bay Meetup SlidesZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
Ensuring Secure and Permission-Aware RAG DeploymentsZilliz
In this talk, we will explore the critical aspects of securing Retrieval-Augmented Generation (RAG) deployments. The focus will be on implementing robust secured data retrieval mechanisms and establishing permission-aware RAG frameworks. Attendees will learn how to ensure that access control is rigorously maintained within the model when ingesting documents, ensuring that only authorized personnel can retrieve data. We will also discuss strategies to mitigate risks of data leakage, unauthorized access, and insider threats in RAG deployments. By the end of this session, participants will have a clearer understanding of the best practices and tools necessary to secure their RAG deployments effectively.
Retrieval Augmented Generation Evaluation with RagasZilliz
Retrieval Augmented Generation (RAG) enhances chatbots by incorporating custom data in the prompt. Using large language models (LLMs) as judge has gained prominence in modern RAG systems. This talk will demo Ragas, an open-source automation tool for RAG evaluations. Christy will talk about and demo evaluating a RAG pipeline using Milvus and RAG metrics like context F1-score and answer correctness.
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Zilliz
Enterprises have traditionally prioritized data quantity, assuming more is better for AI performance. However, a new reality is setting in: high-quality data, not just volume, is the key. This shift exposes a critical gap – many organizations struggle to understand their existing data and lack effective curation strategies and tools. This talk dives into these data challenges and explores the methods of automating data curation.
It's your unstructured data: How to get your GenAI app to production (and spe...Zilliz
So you've successfully built a GenAI app POC for your company -- now comes the hard part: bringing it to production. Aparavi addresses the challenges of AI projects while addressing data privacy and PII. Our Service for RAG helps AI developers and data scientists to scale their app to 1000s to millions of users using corporate unstructured data. Aparavi’s AI Data Loader cleans, prepares and then loads only the relevant unstructured data for each AI project/app, enabling you to operationalize the creation of GenAI apps easily and accurately while giving you the time to focus on what you really want to do - building a great AI application with useful and relevant context. All within your environment and never having to share private corporate data with anyone - not even Aparavi.
The History of Embeddings & Multimodal EmbeddingsZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
Using LLM Agents with Llama 3, LangGraph and MilvusZilliz
RAG systems are talked about in detail, but usually stick to the basics. In this talk, Stephen will show you how to build an Agentic RAG System using Langchain and Milvus.
How Vector Databases are Revolutionizing Unstructured Data Search in AI Appli...Zilliz
"Powered by the popularity of ChatGPT, Llama2, and other LLMs, we've seen a huge surge in interest for vector databases in 2023 and 2024. Vector databases are commonly used to connect relevant documents with LLMs, through a process called retrieval augmented generation (RAG). RAG has seen widespread adoption, from single-person startups to Fortune 500 companies.
Despite the popularity of vector databases for LLMs, they are more broadly applicable for a variety of different types of unstructured data, i.e. any type of data that does not conform to a predefined data model, such as text, images, audio, molecules, and graphs. In this talk, we'll discuss some of the use cases for vector databases across many types of unstructured data."
The presentation will delve into the ASIMOV project, a novel initiative that leverages Retrieval-Augmented Generation (RAG) to provide precise, domain-specific assistance to telecommunications engineers and technicians. The session will focus on the unique capabilities of Milvus, the chosen vector database for the project, and its advantages over other vector databases.
Attending this session will give you a deeper understanding of the potential of RAG and Milvus DB in telecommunications engineering. You will learn how to address common challenges in the field and enhance the efficiency of their operations. The session will equip you with the knowledge to make informed decisions about the choice of vector databases, and how best to use them for your use-cases
Metadata Lakes for Next-Gen AI/ML - DatastratoZilliz
As data catalogs evolve to meet the growing and new demands of high-velocity, unstructured data, we see them taking a new shape as an emergent and flexible way to activate metadata for multiple uses. This talk discusses modern uses of metadata at the infrastructure level for AI-enablement in RAG pipelines in response to the new demands of the ecosystem. We will also discuss Apache (incubating) Gravitino and its open source-first approach to data cataloging across multi-cloud and geo-distributed architectures.
Multimodal Retrieval Augmented Generation (RAG) with MilvusZilliz
We've seen an influx of powerful multimodal capabilities in many LLMs. In this talk, we'll vectorize a dataset of images and texts into the same embedding space, store them in Milvus, retrieve all relevant data using multilingual texts and/or images and input multimodal data as context into GPT-4o.
Building an Agentic RAG locally with Ollama and MilvusZilliz
With the rise of Open-Source LLMs like Llama, Mistral, Gemma, and more, it has become apparent that LLMs might also be useful even when run locally. In this talk, we will see how to deploy an Agentic Retrieval Augmented Generation (RAG) setup using Ollama, with Milvus as the vector database on your laptop. That way, you can also avoid being Rate Limited by OpenAI like I have been in the past.
Specializing Small Language Models With Less DataZilliz
Most AI teams are exploring the possibilities of LLMs, rather than being focused on margins but soon efficiency will become important. Implementing small, specialized models to solve specific problems is an option, but is not leveraged often, because it requires gathering high volumes of human-labeled training data which are hard to acquire. To alleviate this problem, I will discuss how large language models can be used to generate synthetic data used to help tune small models on domain-specific tasks. We will focus on extractive question answering use case where additional unstructured context can help training.
Occiglot - Open Language Models by and for EuropeZilliz
Large language models (LLMs) have emerged as transformative tools, revolutionizing various natural language processing tasks. Despite their remarkable potential, the LLM landscape is predominantly shaped by US tech companies, leaving Europe with limited access and influence. This talk will present Occiglot - an ongoing research collective for open-source language models for and by Europe. More specifically, we will explain why open European LLMs are needed and share insights as well as lessons learned, ranging from data collection and curation, model training and evaluation
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Copilot Workspace: What it is, how it works, why it mattersZilliz
Learn more: https://zilliz.com/blog/what-is-copilot-workspace-and-why-it-matters
Copilot Workspace recently launched into technical preview! Bring your popcorn and come see a live demo of it in action. We'll talk a little bit about the AI developer tooling landscape, what comes after chat, and how these tools should help us to create.
The Challenge of Interpretability in Generative AI Models.pdfSara Kroft
Navigating the intricacies of generative AI models reveals a pressing challenge: interpretability. Our blog delves into the complexities of understanding how these advanced models make decisions, shedding light on the mechanisms behind their outputs. Explore the latest research, practical implications, and ethical considerations, as we unravel the opaque processes that drive generative AI. Join us in this insightful journey to demystify the black box of artificial intelligence.
Dive into the complexities of generative AI with our blog on interpretability. Find out why making AI models understandable is key to trust and ethical use and discover current efforts to tackle this big challenge.
How UiPath Discovery Suite supports identification of Agentic Process Automat...DianaGray10
📚 Understand the basics of the newly persona-based LLM-powered Agentic Process Automation and discover how existing UiPath Discovery Suite products like Communication Mining, Process Mining, and Task Mining can be leveraged to identify APA candidates.
Topics Covered:
💡 Idea Behind APA: Explore the innovative concept of Agentic Process Automation and its significance in modern workflows.
🔄 How APA is Different from RPA: Learn the key differences between Agentic Process Automation and Robotic Process Automation.
🚀 Discover the Advantages of APA: Uncover the unique benefits of implementing APA in your organization.
🔍 Identifying APA Candidates with UiPath Discovery Products: See how UiPath's Communication Mining, Process Mining, and Task Mining tools can help pinpoint potential APA candidates.
🔮 Discussion on Expected Future Impacts: Engage in a discussion on the potential future impacts of APA on various industries and business processes.
Enhance your knowledge on the forefront of automation technology and stay ahead with Agentic Process Automation. 🧠💼✨
Speakers:
Arun Kumar Asokan, Delivery Director (US) @ qBotica and UiPath MVP
Naveen Chatlapalli, Solution Architect @ Ashling Partners and UiPath MVP
Increase Quality with User Access Policies - July 2024Peter Caitens
⭐️ Increase Quality with User Access Policies ⭐️, presented by Peter Caitens and Adam Best of Salesforce. View the slides from this session to hear all about “User Access Policies” and how they can help you onboard users faster with greater quality.
Demystifying Neural Networks And Building Cybersecurity ApplicationsPriyanka Aash
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, ANNs have a rich history and a complex structure that enables them to learn and make decisions. This blog aims to unravel the mysteries of neural networks, explore their mathematical foundations, and demonstrate their practical applications, particularly in building robust malware detection systems using Convolutional Neural Networks (CNNs).
Keynote : Presentation on SASE TechnologyPriyanka Aash
Secure Access Service Edge (SASE) solutions are revolutionizing enterprise networks by integrating SD-WAN with comprehensive security services. Traditionally, enterprises managed multiple point solutions for network and security needs, leading to complexity and resource-intensive operations. SASE, as defined by Gartner, consolidates these functions into a unified cloud-based service, offering SD-WAN capabilities alongside advanced security features like secure web gateways, CASB, and remote browser isolation. This convergence not only simplifies management but also enhances security posture and application performance across global networks and cloud environments. Discover how adopting SASE can streamline operations and fortify your enterprise's digital transformation strategy.
Top 12 AI Technology Trends For 2024.pdfMarrie Morris
Technology has become an irreplaceable component of our daily lives. The role of AI in technology revolutionizes our lives for the betterment of the future. In this article, we will learn about the top 12 AI technology trends for 2024.
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceQuentin Reul
The democratization of Generative AI is ushering in a new era of innovation for enterprises. Discover how you can harness this powerful technology to deliver unparalleled customer value and securing a formidable competitive advantage in today's competitive market. In this session, you will learn how to:
- Identify high-impact customer needs with precision
- Harness the power of large language models to address specific customer needs effectively
- Implement AI responsibly to build trust and foster strong customer relationships
Whether you're at the early stages of your AI journey or looking to optimize existing initiatives, this session will provide you with actionable insights and strategies needed to leverage AI as a powerful catalyst for customer-driven enterprise success.
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Snarky Security
How wonderful it is that in our modern age, every bit of our biological data can be digitized, stored, and potentially pilfered by cyber thieves! Isn't it just splendid to think that while scientists are busy pushing the boundaries of biotechnology, hackers could be plotting the next big bio-data heist? This delightful scenario is brought to you by the ever-expanding digital landscape of biology and biotechnology, where the integration of computer science, engineering, and data science transforms our understanding and manipulation of biological systems.
While the fusion of technology and biology offers immense benefits, it also necessitates a careful consideration of the ethical, security, and associated social implications. But let's be honest, in the grand scheme of things, what's a little risk compared to potential scientific achievements? After all, progress in biotechnology waits for no one, and we're just along for the ride in this thrilling, slightly terrifying, adventure.
So, as we continue to navigate this complex landscape, let's not forget the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. After all, what could possibly go wrong?
-------------------------
This document provides a comprehensive analysis of the security implications biological data use. The analysis explores various aspects of biological data security, including the vulnerabilities associated with data access, the potential for misuse by state and non-state actors, and the implications for national and transnational security. Key aspects considered include the impact of technological advancements on data security, the role of international policies in data governance, and the strategies for mitigating risks associated with unauthorized data access.
This view offers valuable insights for security professionals, policymakers, and industry leaders across various sectors, highlighting the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. The analysis serves as a crucial resource for understanding the complex dynamics at the intersection of biotechnology and security, providing actionable recommendations to enhance biosecurity in an digital and interconnected world.
The evolving landscape of biology and biotechnology, significantly influenced by advancements in computer science, engineering, and data science, is reshaping our understanding and manipulation of biological systems. The integration of these disciplines has led to the development of fields such as computational biology and synthetic biology, which utilize computational power and engineering principles to solve complex biological problems and innovate new biotechnological applications. This interdisciplinary approach has not only accelerated research and development but also introduced new capabilities such as gene editing and biomanufact
This PDF delves into the aspects of information security from a forensic perspective, focusing on privacy leaks. It provides insights into the methods and tools used in forensic investigations to uncover and mitigate privacy breaches in mobile and cloud environments.
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...Fwdays
.NET 8 brought a lot of improvements for developers and maturity to the Azure serverless container ecosystem. So, this talk will cover these changes and explain how you can apply them to your projects. Another reason for this talk is the re-invention of Serverless from a DevOps perspective as a Platform Engineering trend with Backstage and the recent Radius project from Microsoft. So now is the perfect time to look at developer productivity tooling and serverless apps from Microsoft's perspective.
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPathCommunity
Welcome to our third live UiPath Community Day Amsterdam! Come join us for a half-day of networking and UiPath Platform deep-dives, for devs and non-devs alike, in the middle of summer ☀.
📕 Agenda:
12:30 Welcome Coffee/Light Lunch ☕
13:00 Event opening speech
Ebert Knol, Managing Partner, Tacstone Technology
Jonathan Smith, UiPath MVP, RPA Lead, Ciphix
Cristina Vidu, Senior Marketing Manager, UiPath Community EMEA
Dion Mes, Principal Sales Engineer, UiPath
13:15 ASML: RPA as Tactical Automation
Tactical robotic process automation for solving short-term challenges, while establishing standard and re-usable interfaces that fit IT's long-term goals and objectives.
Yannic Suurmeijer, System Architect, ASML
13:30 PostNL: an insight into RPA at PostNL
Showcasing the solutions our automations have provided, the challenges we’ve faced, and the best practices we’ve developed to support our logistics operations.
Leonard Renne, RPA Developer, PostNL
13:45 Break (30')
14:15 Breakout Sessions: Round 1
Modern Document Understanding in the cloud platform: AI-driven UiPath Document Understanding
Mike Bos, Senior Automation Developer, Tacstone Technology
Process Orchestration: scale up and have your Robots work in harmony
Jon Smith, UiPath MVP, RPA Lead, Ciphix
UiPath Integration Service: connect applications, leverage prebuilt connectors, and set up customer connectors
Johans Brink, CTO, MvR digital workforce
15:00 Breakout Sessions: Round 2
Automation, and GenAI: practical use cases for value generation
Thomas Janssen, UiPath MVP, Senior Automation Developer, Automation Heroes
Human in the Loop/Action Center
Dion Mes, Principal Sales Engineer @UiPath
Improving development with coded workflows
Idris Janszen, Technical Consultant, Ilionx
15:45 End remarks
16:00 Community fun games, sharing knowledge, drinks, and bites 🍻