Systems | Development | Analytics | API | Testing

Latest Videos

The Data Chief LIVE: Better for everyone: How to battle bias in AI

Join Dr. Haniyeh Mahmoudian, Global AI Ethicist at DataRobot, Alyssa Simpson Rochwerger, co-author of Real World AI: A Practical Guide for Responsible Machine Learning and Director of Product Management at Blue Shield of California, Dr. Besa Bauta, Chief Data and Analytics Officer of State of Texas, Department of Family and Protective Services and NYU adjunct assistant professor, and ThoughtSpot Chief Data Strategy Officer, Cindi Howson, as they discuss the complexities of bias in AI.

Unleashing the power of Java UDFs with Snowflake

As part of the Snowpark developer experience, customers can execute Java user-defined functions (UDFs) packaged in a JVM right inside Snowflake’s powerful processing engine for better performance, scalability, and concurrency. These Java UDFs can be used for data preparation and enrichment pipelines, implementing custom business logic, and even to run machine learning model inference. In this session, Felipe Hoffa demonstrates how simple it is to get started with Java UDFs for your use case.

SaaS Pricing Model Considerations when Powered by Snowflake

As software companies gain more users or re-platform from traditional platforms to the cloud, they typically need to evolve the pricing models to provide value to the different customer segments and keep their competitive advantage. In today's video, you'll learn about the value of different SaaS pricing models and the advantages of enhancing your SaaS model with a consumption-based revenue stream. From user-based to usage-based pricing, learn how Snowflake’s platform can facilitate a consumption-based model.

Using executors and stages in k6 with Théo Crevon (k6 Office Hours #40)

Théo Crevon, Senior Software Engineer on the k6 OSS team, joins Nicole van der Hoeven to talk about how executors and stages work in k6, and how they can be used to create load profiles. Théo only recently joined k6, and he's already started working on how to improve scheduling in k6 and making other improvements to how the k6 engine performs.

Incorporating Privacy Enhancing Techniques in your Data Privacy Strategy

Maintaining data privacy is critical for modern enterprises. In this talk we will cover the degrees of identifiability and privacy-protection technologies for data pseudonymization, data de-identification, and data anonymization. Join this session to learn about the main threats to data privacy and technologies to privacy protect your data.