article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Recognizing the increasing challenges yet often underappreciated role of these professionals, we launched the 50 CISOs to Watch initiative last year to celebrate the CISOs demonstrating outstanding technical and leadership qualities. Heather is a technical visionary, expertly bridging business requirements with innovative tech solutions.

Security 131
article thumbnail

Deploy large language models for a healthtech use case on Amazon SageMaker

AWS Machine Learning - AI

In 2021, the pharmaceutical industry generated $550 billion in US revenue. Pharmaceutical companies sell a variety of different, often novel, drugs on the market, where sometimes unintended but serious adverse events can occur. Encryption at rest and in transit has to be incorporated into the solution to meet these requirements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The rise of the data lakehouse: A new era of data value

CIO

The giant pharmaceutical chain had put its lakehouse in place to address just such challenges in its quest, to, as Guadagno puts it, “To get the right product in the right place for the right patient.”. Using Apache Ignite technology from GridGain, Wiesenfeld created an in-memory computing architecture.

Data 348
article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

While we like to talk about how fast technology moves, internet time, and all that, in reality the last major new idea in software architecture was microservices, which dates to roughly 2015. Who wants to learn about design patterns or software architecture when some AI application may eventually do your high-level design?

Trends 114
article thumbnail

Data Integrity: Types, Threats, and Countermeasures

Altexsoft

It was suggested by the US Food and Drug Administration (FDA) to define good data integrity practices within the pharmaceutical, biologic, medical devices, and food industries. Inadequate technical processes. Giving access to data, we advise you to require strong passwords with implemented two-factor authentication.

Data 59