##The eighth edition of The Fifth Elephant will be held in Bangalore on 25 and 26 July. A thousand data scientists, ML engineers, data engineers and analysts will gather at the NIMHANS Convention Centre in Bangalore to discuss:
- Model management, including data cleaning, instrumentation and productionizing data science.
- Bad data and case studies of failure in building data products.
- Identifying and handling fraud + data security at scale
- Applications of data science in agriculture, media and marketing, supply chain, geo-location, SaaS and e-commerce.
- Feature engineering and ML platforms.
- What it takes to create data-driven cultures in organizations of different scales.
1. Meet Peter Wang, co-founder of Anaconda Inc, and learn about why data privacy is the first step towards robust data management; the journey of building Anaconda; and Anaconda in enterprise.
2. Talk to the Fulfillment and Supply Group (FSG) team from Flipkart, and learn about their work with platform engineering where ground truths are the source of data.
3. Attend tutorials on Deep Learning with RedisAI; TransmorgifyAI, Salesforce’s open source AutoML.
4. Discuss interesting problems to solve with data science in agriculture, SaaS perspective on multi-tenancy in Machine Learning (with the Freshworks team), bias in intent classification and recommendations.
5. Meet data science, data engineering and product teams from sponsoring companies to understand how they are handling data and leveraging intelligence from data to solve interesting problems.
##Why you should attend?
- Network with peers and practitioners from the data ecosystem
- Share approaches to solving expensive problems such as cleanliness of training data, model management and versioning data
- Demo your ideas in the demo session
- Join Birds of Feather (BOF) sessions to have productive discussions on focussed topics. Or, start your own Birds of Feather (BOF) session.
##Full schedule published here: https://hasgeek.com/fifthelephant/2019/schedule
For more information about The Fifth Elephant, sponsorships, or any other information call +91-7676332020 or email email@example.com
Verifiable Logs and DLT: A recipe for smashing UCC using hashing
Session type: Lecture Session type: Short talk of 20 mins
An “Unsolicited Commercial Communication”(UCC) means a commercial communication which a Subscriber opts not to receive.
For a long time, Telecom Regulatory Authority of India (TRAI) has been a centralized regulating body for any Commercial Communication and now has a mandated for a DLT based solution to mainly overcome problems of cost of regulation apart from establishing proofs
A DLT though helps in creating a decentralized distributed system of trust, doesn’t focus on privacy concerns of the emerging world. The Gartner Survey claims - “By 2021, 75 percent of public blockchains will suffer “privacy poisoning” - inserted personal data that renders the blockchain noncompliant with privacy laws”.  and Justice Srikrishna committee report on data protection claims that “Protection of personal data holds the key to empowerment, progress, and innovation.” .
Keeping the above claims in consideration, we are presenting a DLT based solution combined with the verifiable logs to regulate the current eco-system of Commercial Communication . The subscriber preferences and consents etc. are stored privately by the ecosystem participants as Merkle tree and Merkle proofs are published to the DLT to help in auditing and addressing complaints automatically . The solution implements the concepts of Signed Root Hashes of Merkle Trees and Sparse Merkle Trees, a distributed append-only data structure, to efficiently store the Consumer Preferences and Consent privately but still provides verifiability for the ecosystem participants.
Additionally, the solution implements APIs and services which are designed to provide an auditing mechanism for validating user preference stored/not stored(Proof of Inclusion and Exclusion) and message delivered, over a time frame along with a Reputation model, to implement an incentivization scheme which ensures discipline in Commercial Communication.
- Overview of the problem and limitations in the solution in the current scenario.
- Approach for the solution incorporating Merkle tree as the data structure for validating information providing Merkle path hashes for audit and consistency proofs.
- Proposal for distributed append-only logs for tracking history on account of signed root hashes to validate the inclusion at an index in the tree and the entry of the root in the blockchain.
- Architecture specifying various components used as Independent registrars for handling various entries, AI for reputation model for the entities, Microservice based architecture.
- An On-demand mechanism for auditing.
Basic Understanding of Decentralized applications and Blockchain.
This session will be shared between Harihara Vinayakaram Natarajan, Raksha M P and Prachi Gupta working for Wipro Limited.
Harihara Vinayakaram Natarajan is a Distinguished member of technical staff of Wipro Limited and is a Software Professional with extensive experience(20+ years) with a strong recent focus on Distributed Systems and Machine Learning ( Distributed systems include Blockchain, Cloud, Automation (DevOps) , Log Analytics, Scalable Architectures ) and Big Data. Architected solutions for various domains including Retail, BFSI and Media. Raksha M P(Myself) and Prachi Gupta are blockchain developers working for Wipro CTO Office.