Adversarial LLM AttacksThis is an excerpt from Chapter 8: Safety and Security from my book Large Language Models at Work. The book is now available on Amazon…Nov 10, 2023Nov 10, 2023
PlanningThis is an excerpt from Chapter 7: Planning from my book Large Language Models at Work. The book is now available on Amazon…Oct 27, 2023Oct 27, 2023
Interacting with External SystemsThis is an excerpt from Chapter 6: Interacting with External Systems from my book Large Language Models at Work. The book is now available…Sep 1, 2023Sep 1, 2023
Embeddings and Vector DatabasesThis is an excerpt from Chapter 5: Memory and Embeddings from my book Large Language Models at Work. The book is now available on Amazon…Aug 18, 2023Aug 18, 2023
Published inTDS ArchiveTimelinesA common timeline view helps us understand the various interactions users have with our systems.Sep 6, 2021A response icon2Sep 6, 2021A response icon2
Published inTDS ArchiveIdentity keyringsCorrelating the different identities used throughout your enterpriseJul 11, 2021Jul 11, 2021
Published inData Science at MicrosoftData distributionIn a previous article, Azure Data Explorer at the Azure business scale, I talked about how we use Azure Data Explorer as our main data…Mar 16, 2021Mar 16, 2021
Published inData Science at MicrosoftPartnering for metadata managementIn my previous article, “Common data engineering challenges and their solutions,” I talked about metadata management and promised that we…Dec 8, 2020Dec 8, 2020
Azure Data EngineeringI am happy to announce that my new book, Azure Data Engineering, launched in Manning Early Access Preview (MEAP). While still a work in…Oct 8, 2020A response icon1Oct 8, 2020A response icon1