Advertisement ยท 728 ร— 90

Posts by Ada Loves Lace

And surely a risk that has to be part of any national biodiversity security review.

15 hours ago 1 0 0 0

Media class have forgotten how to celebrate success.

15 hours ago 1 0 0 0

That's even worse for Robbins.

15 hours ago 0 0 0 0

"Why don't you blockade the Strait of Baltic"

- General Keith Kellogg

I don't think he knows what a strait is.

#bbcR4

15 hours ago 2 0 1 0

People think Mamdani just does it naturally. He works at it, he's translating to normal people speak.

17 hours ago 5 0 1 0

Not that I'm pro Zionism but his redefining is a stretch.

17 hours ago 3 0 1 0

I hope the new Mummy movie is good. Personally I was disappointed that Universal gave up on it's most recent mossters universe. I enjoyed the the Tom Cruise version.

17 hours ago 0 0 0 0

The best.

17 hours ago 0 0 0 0

Which is why we isolate the workloads in their own network.

17 hours ago 0 0 0 0

When you configure an analysis, you're saying this is my "Bed pan workflow". So that's you context for the analysis. You choose the attributes and steps of a workflow to capture. If you just care about cost of bedpan service, you're not capturing anything about the patient.

17 hours ago 1 0 0 0
Advertisement

So software captures specified attributes from workflow data and converts to vectors, it doesn't store the original attribute (because that's not needed to produce analytics). This all has to be configured, out of the box it can't do anything.

17 hours ago 0 0 2 0

It's just vectors though. A "1" in one data set doesn't mean the same as a "1" in another. The vectors are contextual to the analysis being conducted.

18 hours ago 0 0 1 0

"Metaverse" was a waste of time. NFT is interesting as an idea, but wouldn't be missed if it didn't exist.

LLMs, that's a technology, like it or loathe it, that is here to stay. Will it be abused, of course, like any technology. Does it have its uses, yes.

18 hours ago 0 0 0 0

Remember also, these system aren't storing data like a name or an address, they're storing just vectors.

18 hours ago 0 0 1 0

That's why it's important to not have attributes that can be combined. And also to not have the datasets in the same database, and not use the same keys.

18 hours ago 0 0 0 0

Isn't it interesting though that no one seems concerned by the systems used in UKSV. ๐Ÿ™‚

18 hours ago 0 0 0 0

No, there was no steering committee in that process.

18 hours ago 0 0 0 0
Advertisement

No, because each analysis is separately configured and generates its own dataset. And as I say, in each analysis, you choose on the attributes you want to capture, so those attributes wouldn't be capture anyway and so aren't present to derive from.

18 hours ago 0 0 1 0

They can't though, because there are very strict checks and balances that have to be passed for projects to go live, steering committee and stakeholders have to sign off.

18 hours ago 0 0 1 0

From that specific workflow's perspective, that data isn't relevant, it's just bed number X.

18 hours ago 0 0 1 0

Not in my experience. Technical and solutions architects highlight the risks. They take pride in their work. Vendor's specialists too tend to take the side of the security folk because they don't want reputational risk.

18 hours ago 0 0 1 0

It isn't even loosely correlated. It's like this, say a nurse had to take a bed pan to a bed. All that is capture is that a nurse had to take a bed pan to a bed, where the pan had to be fetched from, when it was recovered, cleaned, etc. Not interested in the nurse or the patient.

18 hours ago 0 0 1 0

Yeah, but ministers are so far removed from the operational end of these implementations. There are really good experienced technical folk in the NHS and they know best practice too.

18 hours ago 0 0 1 0

Re side note, thankfully an MP doesn't do the actual design and architecture. ๐Ÿ˜„

18 hours ago 0 0 1 0

For example, we might develop a model that is good for analyzing procurement workflows to look at the differences in different NHS trusts.

That's something that's often overlooked, we use these tools to create our own models too.

18 hours ago 0 0 1 0

Also, we don't always use their models, the platform is extensible, so we can plug-in models of our choosing. It depends on the use cases.

18 hours ago 0 0 1 0
Advertisement

We're analyzing it, it doesn't leave our data centers. We don't give them the keys, and they don't have access to the network.

18 hours ago 0 0 1 0

No, there's not patient data. It's just about which workflows are used, i.e. how often is a cancer patient is seen, how often, length of consultation, etc. The specific patient isn't important for the workflow analysis. It's more about are processes and procedures consistent or is there variance.

18 hours ago 0 0 0 0

It's standard encryption algorithms, we generate the keys, they don't have those. So they've never be able to decrypt anyway without the keys.

18 hours ago 0 0 1 0

Doesn't work like that. Workflows are turned into vectorized data for the models to analyze. When an analysis model is configured you can name it, like "Update patient notes flow", but it's the workflow actions that are captured not the data of the actions (not the notes).

18 hours ago 0 0 1 0