talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

talk
by David Hermann (Digitec Galaxus AG - Zurich, Switzerland) , Lukas Oldenburg (dim28.ch - Zurich, Switzerland)

Web bots have been around for decades, but the volume of bot traffic has increased massively. So has the complexity of bot filtering. While the bots have become way better, bot filtering solutions haven’t – especially in common analytics tools. Even IT security teams are usually not handling the problem properly.

Mastering PostgreSQL 15 - Fifth Edition

Mastering PostgreSQL 15 provides a deep dive into advanced topics of PostgreSQL database systems, covering installation, configuration, optimization, and administration. By reading this book, you will gain the skills to manage, secure, and optimize PostgreSQL database instances for complex applications. What this Book will help me do Understand and utilize advanced indexing techniques in PostgreSQL to improve query performance. Perform efficient database backup and recovery processes to ensure data safety and integrity. Master replication and failover methods to achieve high availability and data consistency. Implement authentication and encryption to enhance database server security. Troubleshoot PostgreSQL to identify and resolve common operational issues. Author(s) Hans-Jürgen Schönig, the author of Mastering PostgreSQL 15, is a leading expert in PostgreSQL with decades of experience in the field. His passion for databases has driven him to deliver solutions in high-performance database management and large-scale data systems. With a thorough and approachable style, Hans-Jürgen imparts complex technical knowledge effectively to his readers. Who is it for? This book is ideal for experienced PostgreSQL developers and database administrators looking to master PostgreSQL 15. Readers should have a foundational understanding of database systems and are seeking to implement advanced features and best practices in enterprise environments. It's tailored for those aspiring to enhance their operational and architectural skills in managing PostgreSQL systems.

Microsoft Power Platform Enterprise Architecture - Second Edition

Microsoft Power Platform Enterprise Architecture is your essential guide to designing powerful, enterprise-grade solutions using Microsoft technology. This thoroughly structured book equips you with architectural insights, methodologies, and best practices necessary to optimize solutions using the Microsoft Power Platform and integrate them seamlessly with M365 and Azure. What this Book will help me do Design robust enterprise solutions leveraging Microsoft Power Platform and Dynamics 365. Integrate Power Platform tools with Microsoft 365 and Azure effectively for comprehensive solutions. Implement advanced security, extensibility, and lifecycle management methodologies. Migrate and manage data efficiently within the Power Platform ecosystem. Overcome architectural challenges in multi-system integration using proven techniques. Author(s) Robert Rybaric, the author of this book, is an experienced enterprise architect specializing in Microsoft technologies. With years of expertise in designing enterprise systems, Robert brings practical insights into crafting effective solutions using Microsoft Power Platform. His approach emphasizes clarity and practicality, ensuring concepts are both illustrative and applicable for readers. Who is it for? This book is ideal for enterprise architects and technical decision-makers aiming to design and deploy complex solutions using the Microsoft Power Platform. It is tailored for professionals with familiarity with Microsoft Power Platform and Azure services who wish to refine their skills in enterprise architecture to meet growing business demands efficiently.

On today’s episode, we’re talking to Si Dhanak. Si is the VP of Product at Latch, a company aimed at making spaces better places to live, work and visit. Here’s some of what we talk about:

  • Si’s background, how Latch works and the problems it solves.
  • Hardware companies that move into software and vice versa.
  • Do you need to choose between selling to businesses and selling to consumers?
  • Capitalizing on the transition from analog to digital.
  • Creating trust in digital innovations around physical security.
  • When is the right time to start a software business?
  • The challenges around valuing SaaS businesses.
  • Advice for people who want to start a SaaS company.

Si Dhanak - https://www.linkedin.com/in/saayuj/ Latch - https://www.linkedin.com/company/latch/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

On today’s episode, we’re joined by Phyl Terry, Founder and CEO of Collaborative Gain, a community of smart, passionate leaders who help each other build better, more customer (and employee) centric companies.

We talk about:

  • Phyl’s story and the story behind Collaborative Gain.
  • Phyl’s book, "Never Search Alone", and the three big ideas inside it.
  • Is there a business model behind the community Phyl has built?
  • The dangers of people thinking they have unlimited time in their careers.
  • How some organizations are naturally better at attracting the right people.
  • The value of combining the right people with the right vision.

Phyl Terry - https://www.linkedin.com/in/phylterry/# Collaborative Gain - https://www.linkedin.com/company/collaborative-gain/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

IBM FlashSystem 9500 Product Guide

This IBM® Redpaper® Product Guide describes the IBM FlashSystem® 9500 solution, which is a next-generation IBM FlashSystem control enclosure. It combines the performance of flash and a Non-Volatile Memory Express (NVMe)-optimized architecture with the reliability and innovation of IBM FlashCore® technology and the rich feature set and high availability (HA) of IBM Spectrum® Virtualize. Often, applications exist that are foundational to the operations and success of an enterprise. These applications might function as prime revenue generators, guide or control important tasks, or provide crucial business intelligence, among many other jobs. Whatever their purpose, they are mission critical to the organization. They demand the highest levels of performance, functionality, security, and availability. They also must be protected against the modern scourge, cyberattacks. To support such mission-critical applications, enterprises of all types and sizes turn to the IBM FlashSystem 9500. IBM FlashSystem 9500 provides a rich set of software-defined storage (SDS) features that are delivered by IBM Spectrum Virtualize, including the following examples: Data reduction and deduplication Dynamic tiering Thin-provisioning Snapshots Cloning Replication and data copy services Cyber resilience Transparent Cloud Tiering IBM HyperSwap® including 3-site replication for HA Scale-out and scale-up configurations that further enhance capacity and throughput for better availability With the release of IBM Spectrum Virtualize V8.5, extra functions and features are available, including support for new third-generation IBM FlashCore Modules NVMe-type drives within the control enclosure, and 100 Gbps Ethernet adapters that provide NVMe Remote Direct Memory Access (RDMA) options. New software features include GUI enhancements and security enhancements, including multifactor authentication (MFA) and single sign-on (SSO), and Fibre Channel (FC) portsets.

On today’s episode, we’re talking to Dylan Barrell, Chief Technology Officer at Deque Systems, Inc, a web accessibility software and services company aimed at giving everyone, regardless of ability, equal access to information, services and applications on the web.

We talk about:

  • Dylan’s background and what Deque does.
  • The importance of accessibility in software.
  • Dylan’s book, “Agile Accessibility Handbook,” and why he wrote it.
  • Are there any particular tools to identify accessibility issues in software?
  • Countries that are leading the way around SaaS accessibility.
  • Advice for smaller, newer SaaS companies to prioritize accessibility.
  • How tech trends like AI, the IoT and algorithms have impacted accessibility.

Dylan Barrell - https://www.linkedin.com/in/dylanbarrell/ Deque Systems - https://www.linkedin.com/company/deque-systems-inc/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

On today’s episode, we’re joined by John Wills. John is the Field CTO at Alation, a data intelligence company that helps organizations find, understand and trust data.

We talk about:

  • John’s background and Alation.
  • Cataloging data within an organization.
  • How developers can access and use cataloged data.
  • Will data become more and more critical for organizations?
  • The friction between business growth and regulatory compliance.
  • The increasing complexity of data and how this impacts cataloging.
  • Different types of data marketplaces and the exchange between them.
  • The impact of machine learning and artificial intelligence on data cataloging.

John Wills - https://www.linkedin.com/in/johnwwills/ Alation - https://www.linkedin.com/company/alation/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

We are excited to welcome Linux NFS Kernel Maintainer and CTO of Hammerspace, Trond Myklebust, to join us on this episode of the podcast! Trond and Molly discuss the Linux community and Trond's journey from aspiring Particle Physics Ph. D. to Linux Maintainer and innovative industry technology visionary.  Trond has dedicated a career to building open source software and driving innovation in data technologies.  In this episode we discuss the evolution of high-performance file systems.  Historically, parallel file systems have required additional client software to be loaded on each client machine that needs to work with high-performance data sets. Added software can be difficult to get approved by security team standards, slow to be added to workstation images, and is typically charged per client software instance. These challenges have made it difficult to give access to all users and applications that could derive value from the data sets housed in the parallel file system. All of this began to change with the vision of the Linux community developing an embedded parallel file system as part of the NFS protocol. With the creation of pNFS (parallel NFS), compute-standard Linux clients now can read and write directly to the storage, and scale performance linearly and near infinitely. Expensive and proprietary software is no longer needed to create a parallel file system. pNFS is built into open standards.   All these topics and more as we dive deeper into the data driven world on this podcast episode of Data Unchained!

data #pNFS #NFS #Linux #Maintainer #Community #decentralizeddata #datastorage #storage

Cyberpunk by jiglr | https://soundcloud.com/jiglrmusic Music promoted by https://www.free-stock-music.com Creative Commons Attribution 3.0 Unported License https://creativecommons.org/licenses/by/3.0/deed.en_US Hosted on Acast. See acast.com/privacy for more information.

Net Zeros and Ones

Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and sustainable data erasure while complying with regulatory, legal, and industry requirements. In the book, you’ll discover the why, how, and when of data sanitization, including why it is a crucial component in achieving circularity within IT operations. You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information—all while being served entertaining industry anecdotes and commentary from leading industry personalities. The authors also discuss: Several new standards on data erasure, including the soon-to-be published standards by the IEEE and ISO How data sanitization strengthens a sustainability or Environmental, Social, and Governance (ESG) program How to adhere to data retention policies, litigation holds, and regulatory frameworks that require certain data to be retained for specific timeframes An ideal resource for ESG, data protection, and privacy professionals, Net Zeros and Ones will also earn a place in the libraries of application developers and IT asset managers seeking a one-stop explanation of how data erasure fits into their data and asset management programs.

Summary

Encryption and security are critical elements in data analytics and machine learning applications. We have well developed protocols and practices around data that is at rest and in motion, but security around data in use is still severely lacking. Recognizing this shortcoming and the capabilities that could be unlocked by a robust solution Rishabh Poddar helped to create Opaque Systems as an outgrowth of his PhD studies. In this episode he shares the work that he and his team have done to simplify integration of secure enclaves and trusted computing environments into analytical workflows and how you can start using it without re-engineering your existing systems.

Announcements

Hello and welcome to the Data Engineering Podcast, the show about modern data management When you're ready to build your next pipeline, or want to test out the projects you hear about on the show, you'll need somewhere to deploy it, so check out our friends at Linode. With their new managed database service you can launch a production ready MySQL, Postgres, or MongoDB cluster in minutes, with automated backups, 40 Gbps connections from your application hosts, and high throughput SSDs. Go to dataengineeringpodcast.com/linode today and get a $100 credit to launch a database, create a Kubernetes cluster, or take advantage of all of their other services. And don't forget to thank them for their continued support of this show! Modern data teams are dealing with a lot of complexity in their data pipelines and analytical code. Monitoring data quality, tracing incidents, and testing changes can be daunting and often takes hours to days or even weeks. By the time errors have made their way into production, it’s often too late and damage is done. Datafold built automated regression testing to help data and analytics engineers deal with data quality in their pull requests. Datafold shows how a change in SQL code affects your data, both on a statistical level and down to individual rows and values before it gets merged to production. No more shipping and praying, you can now know exactly what will change in your database! Datafold integrates with all major data warehouses as well as frameworks such as Airflow & dbt and seamlessly plugs into CI workflows. Visit dataengineeringpodcast.com/datafold today to book a demo with Datafold. RudderStack helps you build a customer data platform on your warehouse or data lake. Instead of trapping data in a black box, they enable you to easily collect customer data from the entire stack and build an identity graph on your warehouse, giving you full visibility and control. Their SDKs make event streaming from any app or website easy, and their extensive library of integrations enable you to automatically send data to hundreds of downstream tools. Sign up free at dataengineeringpodcast.com/rudder Build Data Pipelines. Not DAGs. That’s the spirit behind Upsolver SQLake, a new self-service data pipeline platform that lets you build batch and streaming pipelines without falling into the black hole of DAG-based orchestration. All you do is write a query in SQL to declare your transformation, and SQLake will turn it into a continuous pipeline that scales to petabytes and delivers up to the minute fresh data. SQLake supports a broad set of transformations, including high-cardinality joins, aggregations, upserts and window operations. Output data can be streamed into a data lake for query engines like Presto, Trino or Spark SQL, a data warehouse like Snowflake or Redshift., or any other destination you choose. Pricing for SQLake is simple. You pay $99 per terabyte ingested into your data lake using SQLake, and run unlimited transformation pipelines for free. That way data engineers and data users can process to their heart’s content without worrying about their cloud bill. For data engineering podcast listeners, we’re offering a 30 day trial with unlimited data, so go to dataengineeringpodcast.com/upsolver today an

Snowflake SnowPro Core Certification Study Guide

Prepare smarter, faster, and better with the premier study guide for Snowflake SnowPro Core certification Snowflake, a cloud-based data warehousing platform, has steadily gained popularity since its 2014 launch. Snowflake offers several certification exams, of which the SnowPro Core certification is the foundational exam. The SnowPro Core Certification validates an individual's grasp of Snowflake as a cloud data warehouse, its architectural fundamentals, and the ability to design, implement, and maintain secure, scalable Snowflake systems. The Snowflake SnowPro Core Certification Study Guide delivers comprehensive coverage of every relevant exam topic on the Snowflake SnowPro Core Certification test. Prepare efficiently and effectively for the exam with online practice tests and flashcards, a digital glossary, and concise and easy-to-follow instruction from the subject-matter experts at Sybex. You'll gain the necessary knowledge to help you succeed in the exam and will be able to apply the acquired practical skills to real-world Snowflake solutions. This Study Guide includes: Comprehensive understanding of Snowflake's unique shared data, multi-cluster architecture Guidance on loading structured and semi-structured data into Snowflake Utilizing data sharing, cloning, and time travel features Managing performance through clustering keys, scaling compute up, down & across Steps to account management and security configuration including RBAC & MFA All the info you need to obtain a highly valued credential for a rapidly growing new database software solution Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone considering a new career in cloud-based data warehouse solutions and related fields, Snowflake SnowPro Core Certification Study Guide is also a must-read for veteran database professionals seeking an understanding of one of the newest and fastest-growing niches in data.

In programming, collaboration and experimentation can be very stressful, since sharing code and making it visible to others can be tedious, time-consuming, and nerve-wracking.Tools like Power BI are changing that entirely, by opening up new ways to collaborate between team members, add layers of customized and complex security to the data teams are working with, and making data much more accessible across organizations.

Ginger Grant joins the show to talk about how organizations can utilize Power BI, Dax, and M to their fullest potential and create new opportunities for experimentation, innovation, and collaboration.

Ginger is the Principal Consultant at the Desert Isle Group, working as an expert in advanced analytic solutions, including machine learning, data warehousing, ETL, reporting and cube development, Power BI, Excel Automation, Data Visualization and training. In addition to her consultant work, she is also a blogger at and global keynote speaker on developments and trends in data. Microsoft has also recognized her technical contributions by awarding her a MVP in Data Platform.

In this episode, we talk about what Power BI is, the common mistakes organizations make when implementing Power BI, advanced use cases, and much more.

An Ethical Guide to Cyber Anonymity

"An Ethical Guide to Cyber Anonymity" is a comprehensive resource for understanding and safeguarding your privacy while navigating the internet. By the end of this book, you will have gained the skills and knowledge to maintain your cyber anonymity, ensuring your activities online remain private and secure. What this Book will help me do Understand the fundamental concepts of cyber anonymity and internet privacy. Learn practical methods to protect your identity from being compromised online. Gain expertise in configuring tools to achieve a secure and anonymous online presence. Identify and mitigate risks associated with privacy threats from various entities. Master techniques to ensure safe and private internet usage for yourself and others. Author(s) Kushantha Gunawardana is a seasoned expert in cybersecurity with years of experience in dealing with cyber anonymity and data protection. With a passion for educating others, Kushantha translates complex technical ideas into accessible and actionable knowledge. Their approach combines in-depth technical expertise with a focus on ethical practices and real-world applications. Who is it for? This book is ideal for journalists, ethical hackers, and cybersecurity professionals who are striving to protect their anonymity online. It is also a great resource for security-aware individuals looking to safeguard their personal privacy. Beginners or intermediates in the field of web privacy who aim to strengthen their understanding will find this book highly valuable. Parents wishing to protect their family's online identity can also benefit from its guidance.

Cybersecurity and Privacy Law Handbook

Cybersecurity and privacy compliance are critical to protecting organizations from data breaches and fines. In the "Cybersecurity and Privacy Law Handbook," you'll find practical, beginner-friendly guidance to understand standards, identify gaps, and implement policies to secure your workplace effectively. What this Book will help me do Understand international cybersecurity standards such as ISO27001 and NIST. Identify and analyze security gaps using gap analysis and business impact methodologies. Ensure compliance with privacy laws like GDPR, HIPAA, and FTC regulations. Develop and implement effective cybersecurity policies and procedures. Navigate complex US-specific privacy regulations and their implications. Author(s) None Rocchi is an experienced author and practitioner in cybersecurity and privacy. With extensive knowledge in international compliance standards, they excel in breaking down complex topics into digestible and actionable content. Their practical and approachable writing style makes tackling the technical and legal facets of cybersecurity straightforward and engaging. Who is it for? This book is tailored for professionals new to cybersecurity and privacy who wish to understand and implement fundamental practices in this domain. It is ideal for managers, students, or experts from other fields looking to manage security functions effectively. No prior deep technical knowledge is required, making it friendly for beginners.

Oracle Autonomous Database in Enterprise Architecture

Explore the capabilities of Oracle Autonomous Database (ADB) to improve enterprise-level data management. Through this book, you will dive deep into deploying, managing, and securing ADBs using Oracle Cloud Infrastructure (OCI). Gain hands-on experience with high-availability setups, data migration methods, and advanced security measures to elevate your enterprise architecture. What this Book will help me do Understand the key considerations for planning, migrating, and maintaining Oracle Autonomous Databases. Learn to implement high availability solutions using Autonomous Data Guard in ADB environments. Master the configuration of backup, restore, and disaster recovery strategies within OCI. Implement advanced security practices including encryption and IAM policy management. Gain proficiency in leveraging ADB features like APEX, SQL Developer Web, and REST APIs for rapid application development. Author(s) The authors None Sharma, Krishnakumar KM, and None Panda are experts in database systems, particularly in Oracle technologies. With years of hands-on experience implementing enterprise solutions and training professionals, they have pooled their knowledge to craft a resource-rich guide filled with practical advice. Who is it for? This book is ideal for cloud architects, database administrators, and implementation consultants seeking to leverage Oracle's Autonomous Database for enhanced automation, security, and scalability. It is well-suited for professionals with foundational knowledge of Linux, OCI, and databases. Aspiring cloud engineers and students aiming to understand modern database management will also benefit greatly.

In today’s episode, we’re joined by Michael Ramsbacker, Chief Product Officer at Trulioo, a leading global identity and business verification provider specializing in AML, KYC and KYB compliance.

We talk about:

  • Michael’s background and the problems Trulioo is trying to solve.
  • The importance of verifying identities across global markets.
  • The challenges of implementing identity verification in an internet built on anonymity.
  • How the role of product managers has changed as SaaS has evolved.
  • The kind of culture and conditions needed for a software organization to succeed.
  • How technologies like artificial intelligence and machine learning impact a SaaS product’s growth.
  • The foundations that need to be in place to have trusted identity verification online.
  • Key lessons for product managers.
  • Striking a balance between focusing internally and externally as a CPO.

Michael Ramsbacker - https://www.linkedin.com/in/ramsbacker/ Trulioo - https://www.linkedin.com/company/trulioo/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

On today’s episode we’re joined by Manish Garg, SVP of Product and Technology at EarnUp, a tech platform that reduces risk, streamlines operations and improves the financial health of your borrowers.

We talk about:

  • How EarnUp works and the problems it solves.
  • How can startups successfully navigate the early stages?
  • Building something new vs. improving on an existing product.
  • A hybrid model between building on existing products and moving into innovation.
  • How to recognize a strong product-market fit.
  • The impact of AI and machine learning in business.

Manish Garg - https://www.linkedin.com/in/manishgarg/ EarnUp - https://www.linkedin.com/company/earnup/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

In today’s episode, we’re joined by Jon Darbyshire, Co-Founder and CEO at SmartSuite, a collaborative Work Management platform that enables teams to plan, track and manage workflows.

We talk about:

  • Jon’s background and how SmartSuite works.
  • No-code vs low-code.
  • What drove the popularity of no-code?
  • The value of being able to hire people from all around the world.
  • The similar driving factors behind remote work and no-code.
  • How the interaction between product management and engineering and QA has changed over time.
  • How will the no-code space evolve over the next 10 years?
  • The impact of AI and smarter algorithms in the no-code space.

Jon Darbyshire - https://www.linkedin.com/in/jondarbyshire/ SmartSuite - https://www.linkedin.com/company/hellosmartsuite/

This episode is brought to you by Qrvey

The tools you need to take action with your data, on a platform built for maximum scalability, security, and cost efficiencies. If you’re ready to reduce complexity and dramatically lower costs, contact us today at qrvey.com.

Qrvey, the modern no-code analytics solution for SaaS companies on AWS.

saas #analytics #AWS #BI

Optimized Inferencing and Integration with AI on IBM zSystems: Introduction, Methodology, and Use Cases

In today's fast-paced, ever-growing digital world, you face various new and complex business problems. To help resolve these problems, enterprises are embedding artificial intelligence (AI) into their mission-critical business processes and applications to help improve operations, optimize performance, personalize the user experience, and differentiate themselves from the competition. Furthermore, the use of AI on the IBM® zSystems platform, where your mission-critical transactions, data, and applications are installed, is a key aspect of modernizing business-critical applications while maintaining strict service-level agreements (SLAs) and security requirements. This colocation of data and AI empowers your enterprise to optimally and easily deploy and infuse AI capabilities into your enterprise workloads with the most recent and relevant data available in real time, which enables a more transparent, accurate, and dependable AI experience. This IBM Redpaper publication introduces and explains AI technologies and hardware optimizations, such as IBM zSystems Integrated Accelerator for AI, and demonstrates how to leverage certain capabilities and components to enable solutions in business-critical use cases, such as fraud detection and credit risk scoring on the platform. Real-time inferencing with AI models, a capability that is critical to certain industries and use cases such as fraud detection, now can be implemented with optimized performance thanks to innovations like IBM zSystems Integrated Accelerator for AI embedded in the Telum chip within IBM z16™. This publication also describes and demonstrates the implementation and integration of the two end-to-end solutions (fraud detection and credit risk), from developing and training the AI models to deploying the models in an IBM z/OS® V2R5 environment on IBM z16 hardware, and to integrating AI functions into an application, for example an IBM z/OS Customer Information Control System (IBM CICS®) application. We describe performance optimization recommendations and considerations when leveraging AI technology on the IBM zSystems platform, including optimizations for micro-batching in IBM Watson® Machine Learning for z/OS (WMLz). The benefits that are derived from the solutions also are described in detail, which includes how the open-source AI framework portability of the IBM zSystems platform enables model development and training to be done anywhere, including on IBM zSystems, and the ability to easily integrate to deploy on IBM zSystems for optimal inferencing. You can uncover insights at the transaction level while taking advantage of the speed, depth, and securability of the platform. This publication is intended for technical specialists, site reliability engineers, architects, system programmers, and systems engineers. Technologies that are covered include TensorFlow Serving, WMLz, IBM Cloud Pak® for Data (CP4D), IBM z/OS Container Extensions (zCX), IBM Customer Information Control System (IBM CICS), Open Neural Network Exchange (ONNX), and IBM Deep Learning Compiler (zDLC).