06May

PLAN-SEQ-LEARN: A Machine Learning Method that Integrates the Long-Horizon Reasoning Capabilities of Language Models with the Dexterity of Learned Reinforcement Learning RL Policies


The robotics research field has significantly transformed by integrating large language models (LLMs). These advancements have presented an opportunity to guide robotic systems in solving complex tasks that involve intricate planning and long-horizon manipulation. While robots have traditionally relied on predefined skills and specialized engineering, recent developments show potential in using LLMs to help guide reinforcement learning (RL) policies, bridging the gap between abstract high-level planning and detailed robotic control. The challenge remains in translating these models’ sophisticated language processing capabilities into actionable control strategies, especially in dynamic environments involving complex interactions.

Robotic manipulation tasks often require executing a series of finely tuned behaviors, and current robotic systems struggle with the long-horizon planning needed for these tasks due to limitations in low-level control and interaction, particularly in dynamic or contact-rich environments. Existing tools, such as end-to-end RL or hierarchical methods, attempt to address the gap between LLMs and robotic control but often suffer from limited adaptability or significant challenges in handling contact-rich tasks. The primary problem revolves around efficiently translating abstract language models into practical robotic control, traditionally limited by LLMs’ inability to generate low-level control.

The Plan-Seq-Learn (PSL) framework by researchers from Carnegie Mellon University and Mistral AI is introduced as a modular solution to address this gap, integrating LLM-based planning for guiding RL policies in solving long-horizon robotic tasks. PSL decomposes tasks into three stages: high-level language planning (Plan), motion planning (Seq), and RL-based learning (Learn). This allows PSL to handle both contact-free motion and complex interaction strategies. The PSL system leverages off-the-shelf vision models to identify the target regions of interest based on high-level language input, providing a structured plan for sequencing the robot’s actions through motion planning.

PSL uses an LLM to generate a high-level plan that sequences robot actions through motion planning. Vision models help predict regions of interest, allowing the sequencing module to identify target states for the robot to achieve. The motion planning component drives the robot to these states, and the RL policy takes over to perform the required interactions. This modular approach allows RL policies to refine and adapt control strategies based on real-time feedback, enabling a robotic system to navigate complex tasks. The research team demonstrated PSL across 25 complex robotics tasks, including contact-rich manipulation tasks and long-horizon control tasks involving up to 10 stages. This involved tasks with up to 10 sequential stages requiring up to 10 separate robotic sub-tasks.

PSL achieved a success rate above 85%, significantly outperforming existing methods like SayCan and MoPA-RL. This was particularly evident in contact-rich tasks, where PSL’s modular approach enabled robots to adapt to unexpected conditions in real-time, efficiently solving the complex interactions required. The flexibility of the PSL framework allows for a modular combination of planning, motion, and learning, enabling it to handle different types of tasks from a wide range of robotics benchmarks. By sharing RL policies across all stages of a task, PSL achieved remarkable efficiency in training speed and task performance, outstripping methods like E2E and RAPS.

In conclusion, the research team demonstrated the effectiveness of PSL in leveraging LLMs for high-level planning, sequencing motions using vision models, and refining control strategies through RL. PSL achieves a delicate balance of efficiency and precision in translating abstract language goals into practical robotic control. Modular planning and real-time learning make PSL a promising framework for future robotics applications, enabling robots to navigate complex tasks involving multi-step plans.


Check out the Paper and ProjectAll credit for this research goes to the researchers of this project. Also, don’t forget to follow us on Twitter. Join our Telegram Channel, Discord Channel, and LinkedIn Group.

If you like our work, you will love our newsletter..

Don’t Forget to join our 41k+ ML SubReddit


Sana Hassan, a consulting intern at Marktechpost and dual-degree student at IIT Madras, is passionate about applying technology and AI to address real-world challenges. With a keen interest in solving practical problems, he brings a fresh perspective to the intersection of AI and real-life solutions.






Source link

06May

Data Science Software Engineer at ID Business Solutions


IDBS is a dynamic and innovative company providing purpose-built software solutions to address the data management challenges prominent across the BioPharma lifecycle and supply chain.

Leveraging more than 30 years of experience in life science informatics, we are uniquely positioned to deliver a portfolio of innovative BioPharma knowledge management technologies to streamline the capture, analysis, reporting and sharing of data required to accelerate the next generation of life-changing therapies.

Cloud-native and analytics-centric, our platforms enable customers in research, development and manufacturing to efficiently and compliantly access critical data and insights to make faster, smarter decisions with greater confidence.

IDBS serves thousands of users across hundreds of organizations around the globe. Our predominant customer base is Life Sciences and includes 23 of the top 25 pharmaceutical companies and more than 250 small and medium-sized pharma and BioPharma companies, CROs, CDMOs and CMOs.

IDBS is one of 10 Life Sciences companies of Danaher. Together, we accelerate the discovery, development and delivery of solutions that safeguard and improve human health.

Do you want to work in an Agile software team? Do you enjoy using statistics and AI to solve problems?

We are currently seeking a Data Science Software Engineer who will be responsible for creating high quality software, including data science models, for use primarily across the pharmaceutical, life-science and healthcare industries. This will involve a combination of creating solutions to mine, interpret, clean, analyze and visualize scientific data, and of coding and integrating the solutions into IDBS’s platform.

This is a hybrid position (minimum 2 days a week – Wednesday and either Tuesday or Thursday).

What we’ll get you doing:

  • Participate in designing, implementing and improving current and new IDBS data and analytics applications
  • Build analytics processes to solve scientific problems
  • Build predictive models and machine learning algorithms
  • Generate information and insights for data sets to facilitate customers in identifying trends and patterns
  • Create visualizations of data in BI tools like Tableau, PowerBI, Spotfire or similar

Here is what success in this role looks like:

  • Bachelor’s degree in statistics, applied mathematics, or related discipline
  • 2+ years experience in data science, and of working with data pipelines
  • Solid knowledge in using Machine Learning and AI methodologies
  • Deep knowledge of maths, probability, statistics and algorithms
  • Strong knowledge of Python, R or similar languages
  • Understanding of data structures, data modelling and software architecture

It would be a plus if you also possess previous experience in:

  • Biology and chemistry knowledge desirable
  • Software development within an agile feature team

At IDBS we believe in designing a better, more sustainable workforce. We recognize the benefits of flexible, hybrid working arrangements for eligible roles and are committed to providing enriching careers, no matter the work arrangement. This position is eligible for a hybrid work arrangement in which you can work part-time at the Company location identified above and part-time remotely from your home. Additional information about this hybrid work arrangement will be provided by your interview team. Explore the flexibility and challenge that working for IDBS can provide.

At Danaher we bring together science, technology and operational capabilities to accelerate the real-life impact of tomorrow’s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. Our global teams are pioneering what’s next across Life Sciences, Diagnostics, Biotechnology and beyond. For more information, visit www.danaher.com.

At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.



Source link

05May

Chief Information Security Officer (f/m/d) at



Chief Information Security Officer (f/m/d) at | Find AI Jobs
















DeepOpinion logo

Your mission
  • Develop and implement an end-to-end cybersecurity and compliance program that aligns with our business objectives and meets regulatory requirements.
  • Define and track clear, measurable cybersecurity and compliance plans, and integrate an information and cybersecurity risk management framework.
  • Advise business, engineering and infrastructure leadership in the implementation of cybersecurity and compliance measures.
  • Implement technical security requirements and lead the project management.
  • Present regular reports to the executive team on the state of cybersecurity and compliance.
  • Implement a cybersecurity culture and awareness program for employees and partners.
  • Lead incident response and monitor security and privacy incidents.
  • Implement a secure system development life-cycle, and define and deliver an information assurance framework.
  • Ensure regulatory compliance and monitor and interpret relevant legislation and regulations.
Your profile
  • Bachelor’s degree in Computer Science, Information Technology, or a related field; MBA preferred.
  • Substantial experience in risk management, information security, or incident response.
  • Proven background in Software Development in a fast-paced environment. 
  • Experience implementing a cybersecurity and compliance program in an engineering organization.
  • Proven ability to define, implement and measure effective incident response playbooks and a cybersecurity culture program.
  • Knowledge of information security management frameworks, such as ISO/IEC 27001, GDPR and SOCII.
  • Knowledge of international privacy laws and financial reporting requirements.
  • Understanding of current legislation and regulations relevant to our organization.
  • Excellent project management skills.
  • Excellent communication skills.
  • Familiarity with cloud-native technologies and agile development methodologies.
  • Fluent in German and English.
What we offer
  • Remote Work & Culture: Work from Munich, Innsbruck, or everywhere else: We are a remote-first company and our team is spread from Vienna, Innsbruck, Munich, Dubai to Sao Paulo.
  • You’ll work alongside amazing, high-performing colleagues, and have a once-in-a-lifetime opportunity to be among the first 20 key hires in a fast-growing, VC-backed technology company. 
  • Accelerated Career Growth: Take Responsibility from day one, learn fast & grow fast 
  • We offer a competitive salary and equity options 
  • Access to an amazing list of advisors and investors that we actively engage with
  • You’ll get a high-quality tech kit of your choice 
About us

About DeepOpinion

DeepOpinion is a well-financed and rapidly growing SaaS technology startup located in Innsbruck and Munich. DeepOpinion is surfing the next wave of automation solutions that will enable companies to automate repetitive cognitive processes using AI/machine learning. Our mission is to free people from repetitive cognitive tasks so that their work is meaningful again, ultimately shaping the future of work.



Source link

05May

Top Courses for Machine Learning with Python


In recent years, the demand for AI and Machine Learning has surged, making ML expertise increasingly vital for job seekers. Additionally, Python has emerged as the primary language for various ML tasks. This article outlines the top ML courses in Python, offering readers the opportunity to enhance their skill set, transition careers, and meet the expectations of recruiters.

Machine Learning with Python

This course covers the fundamentals of machine learning algorithms and when to use each of them. It teaches writing Python code for implementing techniques like K-Nearest neighbors (KNN), decision trees, regression trees, etc., and evaluating the same.

Machine Learning Specialization

“Machine Learning Specialization” teaches the core concepts of machine learning and how to build real-world AI applications using the same. The course covers numerous algorithms of supervised and unsupervised learning and also teaches how to build neural networks using TensorFlow.

Applied Machine Learning in Python

This course offers practical training in applied machine learning, emphasizing techniques over statistical theory. It covers topics such as clustering, predictive modeling, and advanced methods like ensemble learning using the scikit-learn toolkit. 

IBM Machine Learning Professional Certificate

This program by IBM offers comprehensive training in Machine Learning and Deep Learning, covering key algorithms and practices like ensemble learning, survival analysis, K-means clustering, DBSCAN, dimensionality reduction, etc. Participants also gain hands-on experience with open-source frameworks and libraries like TensorFlow and Scikit-learn.

Machine Learning Scientist with Python

“Machine Learning Scientist with Python” helps augment one’s Python skills required for performing supervised, unsupervised, and deep learning. It covers topics like image processing, cluster analysis, gradient boosting, and popular libraries like scikit-learn, Spark, and Keras.

Introduction to Machine Learning

“Introduction to Machine Learning” covers concepts like logistic regression, multilayer perceptrons, convolutional neural networks, natural language processing, etc., and demonstrates their application in various real-world applications. The course also teaches how to implement these models using Python libraries like PyTorch.

Machine Learning with Python: From Linear Models to Deep Learning

This course teaches the fundamentals of machine learning, covering classification, regression, clustering, and reinforcement learning. Students learn to implement and analyze models like linear models, kernel machines, neural networks, and graphical models. They also gain skills in selecting appropriate models for different tasks and effectively managing machine learning projects.

Machine Learning and AI with Python

This course delved into advanced data science concepts using sample datasets, decision trees, random forests, and various machine learning models. It teaches students to train models for predictive analysis, interpret results, identify data biases, and prevent underfitting or overfitting.

Deep Learning Specialization

This course equips learners with the knowledge and skills to understand, develop, and apply deep neural networks in various fields. Through practical projects and industry insights, participants master architectures like CNNs, RNNs, LSTMs, and Transformers using Python and TensorFlow and learn to tackle real-world AI tasks such as speech recognition, natural language processing, and image recognition.

Introduction to Machine Learning with TensorFlow

This course introduces machine learning concepts and demonstrates how to use different algorithms to solve real-world problems. It then moves on to explain the workings of neural networks and how to use the TensorFlow library to build our own image classifier.

Introduction to Machine Learning with Pytorch

This course is similar to the previous one – “Introduction to Machine Learning with TensorFlow.” Instead of the TensorFlow library, it covers another Python library widely used in Deep Learning – Pytorch.

Foundations of Data Science: K-Means Clustering in Python

This course provides a foundational understanding of Data Science, emphasizing essential mathematics, statistics, and programming skills crucial for data analysis. Through practical exercises and a data clustering project, participants gain proficiency in core concepts, preparing them for more advanced Data Science courses and real-world applications across various sectors like finance, retail, and medicine.


We make a small profit from purchases made via referral/affiliate links attached to each course mentioned in the above list.

If you want to suggest any course that we missed from this list, then please email us at 

as**@ma**********.com












Shobha is a data analyst with a proven track record of developing innovative machine-learning solutions that drive business value.




Source link

05May

Deputy Chief Information Security Officer at City of


A best-in-class city that attracts best-in-class talent, Philadelphia is an incredible place to build a career. From our thriving arts scene and rich history to our culture of passion and grit, there are countless reasons to love living and working here. With a workforce of over 30,000 people, and more than 1,000 different job categories, the City of Philadelphia offers boundless opportunities to make an impact. 
As an employer, the City of Philadelphia values inclusion, integrity, innovation, empowerment, and hard work above all else. We offer a vibrant work environment, comprehensive health care and benefits, and the experience you need to grow and excel. If you’re interested in working with a passionate team of people who care about the future of Philadelphia, start here.
What We Offer:
•    Impact – The work you do here matters to millions. 
•    Growth – Philadelphia is growing, why not grow with it? 
•    Diversity & Inclusion – Find a career in a place where everyone belongs.
•    Benefits – We care about your well-being.
 

The Office of Innovation & Technology (OIT) is the central IT agency for the City of Philadelphia headed by the Chief Information Officer (CIO). OIT oversees all major information and communications technology initiatives for the City of Philadelphia – increasing the effectiveness of the information technology infrastructure, where the services provided are advanced, optimized, and responsive to the needs of the City of Philadelphia’s businesses, residents, and visitors. OIT responsibilities include: identifying the most effective approach for implementing new information technology directions throughout city government; improving the value of the city’s technology assets and the return on the city’s technology investments; ensuring data security continuity; planning for continuing operations in the event of disruption of information technology or communications services; and supporting accountable, efficient and effective government across every city department, board, commission and agency.

In support of the CIO, the Chief Information Security Officer (CISO), and the OIT Executive Management Team, the Deputy Chief Information Security Officer (DCISO) brings their experience and passion for the field to join a dynamic Security Team responsible for managing information security risk to systems and data throughout The City of Philadelphia.  This role provides support to the CISO at a strategic level with the development and maintenance of security policies, standards, and procedures.  This role is also critical to shaping the direction of the Information Security Strategy for the City by assisting with the evaluation of emerging trends and best practices in cybersecurity.  The DCISO will analyze technology trends and advancement in areas of IT security and help plan for the long-term direction of the IT organization’s security hardening for City systems. The DCISO shall act on behalf of the CISO as assigned, and, in the absence of the CISO, as the principal security officer advising on IT security-related decisions to inform executive decisions. 

Additionally, the DCISO conducts regular risk assessments and participates in project design reviews with business lines and IT project managers.  This includes a dynamic range of topics including networking, cloud computing technologies, and endpoint technologies.  As such, the DCISO plays a key role in assuring architecture deployments meet security standards.  As part of this role’s day to day responsibilities, the DCISO can be expected to interact with and be a subject matter expert on a range of security domains including Incident Response, SIEM technologies, web and DNS proxies, EDR platforms, privileged access management methodologies, EntraID, and others.  
 

Essential Functions
•    Assists the CISO advising the CIO and executive management team on cybersecurity issues, policies and practices.
•    Evaluate system designs and architectures using a risk-based approach.
•    Perform risk assessments to identify information security risk.
•    Assists the Information Security Group in overseeing a team of security personnel and vendors working together to safeguard the City’s assets, intellectual property, and information systems.
•    Assists the CISO identifying protection goals, objectives, and metrics consistent with the OIT’s strategic plan.
•    Acts as subject matter expert for suite of security tools including EDR, SIEM, vulnerability scanner.
•    Engages with the CISO in directing the development and implementation of security policies, standards, guidelines, and procedures to ensure ongoing maintenance of security.
•    Maintains relationships with other localities, state and federal law enforcement and other related government agencies. 
•    Assists with Incident response planning as well as the investigation of security breaches.
•    Schedules periodic security audits and works with outside consultants as appropriate for independent security audits.  
•    Working with the CISO, provides strategic leadership and guidance at the executive level in critical areas of technology administration having institution, state-wide and/or national impact.
•    Assists the CIO and CISO in leading overall information technology strategic planning to achieve business goals by prioritizing information technology initiatives and coordinating the evaluation, deployment, and management of current and future technology projects.
•    Engages with CISO to provide leadership for planning, developing, and implementing information technology initiatives.
•    Ensures that disaster recovery and business continuity plans comply with OIT’s security goals and objectives.
•    Reviews plans with the CISO and helps schedule security upgrades and maintenance of software.
•    Oversees cross-institutional initiatives and executive level projects, fostering strategic partnerships in carrying out enterprise-wide computing services for the central IT organization.
•    Performs miscellaneous job-related duties as assigned.

Competencies, Knowledge, Skills and Abilities

Managerial
•    Must be an articulate and persuasive leader who can communicate security-related concepts to a broad range of technical and non-technical staff.
•    Experience with planning, auditing, and risk management.
•    Strong interpersonal and communication skills and the ability to work effectively with a wide range of constituencies in a diverse community.
•    Skilled in organizing resources and establishing priorities.
•    Ability to provide strategic guidance and counsel to clientele in the assessment and development of existing and/or proposed systems and their security architecture(s).
•    Ability to foster a cooperative work environment.
•    Experience with IT Risk Management principles, including performing risk assessments, maintaining risk registers, prioritizing remediation activities.
Technical
•    Experience configuring and managing common security tools including EDR, proxies, SIEM solutions, vulnerability scanners, privileged access management solutions, CNAPP, Office365 Security tools. 
•    Experience securing cloud environments.
•    Experience securing Active Directory environments.
•    Experience managing third-party security assessments including penetration testing and web application testing.

•    Completion of a bachelor’s degree program at an accredited college or university, which has included major course work in computer science, information science, system analysis, software engineering, or a closely related field.
•    Minimum of 5 years work experience working directly in an Information Security capacity.
•    Minimum of 2 years work experience working in an Information Security management capacity.
•    Demonstrated project management skills.
•    Working knowledge of security frameworks including NIST, CIS, OWASP.
•    Valid industry recognized certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), is preferred but not required.

Salary Range: $130,000 – $140,000

Starting salary to be determined based on experience and qualifications.

Important: To apply, candidates must provide a cover letter and a resume.

Discover the Perks of Being a City of Philadelphia Employee:
•    We offer Comprehensive health coverage for employees and their eligible dependents
•    Our wellness program offers eligibility into the discounted medical plan
•    Employees receive paid vacation, sick leave, and holidays
•    Generous retirement savings options are available
•    Pay off your student loans faster – As a qualifying employer, City of Philadelphia employees are eligible to participate in the Public Service Loan Forgiveness program. Join the ranks of hundreds of employees who have already benefited from this program and achieved student loan forgiveness.
•    Enjoy a Free Commute on SEPTA – Starting September 1, 2023, eligible City employees will no longer have to worry about paying for SEPTA public transportation. Whether you’re a full-time, part-time, or provisional employee, you can seize the opportunity to sign up for the SEPTA Key Advantage Program and receive free Key cards for free rides on SEPTA buses, trains, trolleys, and regional rails.
•    Unlock Tuition Discounts and Scholarships – The City of Philadelphia has forged partnerships with over a dozen esteemed colleges and universities in the area, ensuring that our employees have access to a wide range of tuition discounts and scholarships. Experience savings of 10% to 40% on your educational expenses, extending not only to City employees but in some cases, spouse and dependents too!
Join the City of Philadelphia team today and seize these incredible benefits designed to enhance your financial well-being and personal growth!

*The successful candidate must be a city of Philadelphia resident within six months of hire

Effective May 22, 2023, vaccinations are no longer required for new employees that work in non-medical, non-emergency or patient facing positions with the City of Philadelphia. As a result, only employees in positions providing services that are patient-facing medical care (ex: Nurses, doctors, emergency medical personnel), must be fully vaccinated.

The City of Philadelphia is an Equal Opportunity employer and does not permit discrimination based on race, ethnicity, color, sex, sexual orientation, gender identity, religion, national origin, ancestry, age, disability, marital status, source of income, familial status, genetic information or domestic or sexual violence victim status. If you believe you were discriminated against, call the Philadelphia Commission on Human Relations at 215-686-4670 or send an email to [email protected].
 



Source link

05May

Global Chief Privacy Officer & SSBI Data Protection


Who we are looking for

With immediate effect we are looking for a Global Chief Privacy Officer & SSBI Data Protection Officer, Managing Director. This role will report to Global Chief Compliance Officer and SSBI Chief Administrative Officer. This role can be performed in a hybrid model, where you can balance work from home and office. We are open to hire in Munich, Frankfurt, Germany or Krakow, Poland.

 

Why this role is important to us

The team you will be joining plays an important role in the overall success of the organization. Across the globe, institutional investors rely on us to help them manage risk, respond to challenges, and drive performance and profitability. To make that happen we need teams like yours to help navigate employees and the organization as a whole. In your role you will strive for cutting-edge solutions, that are straightforward and scalable. You will help us build resilience and execute day to day deliverables at our best.
Join us if making your mark in the financial services industry from day one is a challenge you are up for.

What you will be responsible for

As the State Street Global Chief Privacy Officer & SSBI Data Protection Officer you will

  • As a member of the Senior Compliance Leadership Team, provide compliance technical advice and consulting as a subject matter expert on data protection standards and strategically developing, enforcing and leading the global privacy compliance program;

  • Fulfill the role of the data protection officer of State Street Bank International GmbH (SSBI), a German credit institution with branches across Europe, in line with the requirements of Global Data Protection Regulation and local data protection laws in the countries where SSBI is operating;

  • Continue to improve and build upon a strong global privacy compliance program that keeps pace with  applicable global regulations as well as local regulations applicable to SSBI, including oversight for testing and reporting of applicable law, regulatory guidance, and internal policy requirements;

  • Ensure effective execution of privacy and data protection requirements, maintenance and adherence to related policies and procedures, commensurate with the level of privacy risk;

  • Work collaboratively with the Chief Data Office, Chief Information Security Officer and other internal stakeholders across governance forums, strategic projects and engagements to drive the execution of the global privacy compliance program;

  • Assist the business and corporate functions with the design and execution of internal controls to address privacy and data protection business requirements and mitigate privacy risks;

  • Execute an effective global regulatory change management program by keeping pace with changes in regulation and working with business partners to identify and assess the impact of privacy regulatory changes to the firm, business, technology operations, processes or operating procedures;

  • Direct incident response for privacy breaches in coordination with internal partners who oversee mitigation strategies and regulatory communications;

  • Assist with preparing for or leading privacy related regulatory examinations, internal audits and internal testing requirements;

  • Work with business and corporate partners to ensure that privacy incidents are reported timely and accurately and assist in determining necessary client notifications, as appropriate;

  • Ensure that controllers and data subjects are informed about their data protection rights, obligations and responsibilities and raise awareness about them;

  • Give advice and recommendations to the organization about the interpretation or application of the data protection rules;

  • Create a register of processing operations within the organization and notify the appropriate data protection authority about those that present specific risks via prior consultation;

  • Ensure data protection compliance within her organization and help the latter to be accountable in this respect;

  • Handle queries or complaints on request by the organization, the controller, other person(s), or on her own initiative;

  • Cooperate with and act as the contact point for the data protection authorities (responding to requests about investigations, complaint handling, and inspections, etc.);

  • Draw the organization’s attention to any failure to comply with the applicable data protection rule;

  • Lead a team of privacy professionals in conducting privacy impact assessments in collaboration with business, product, engineering and legal teams to design and implement process improvements to ensure risk mitigation activities are effective;

  • Proactively manage privacy risk through managing governance forums, performing risk assessments, directing monitoring and testing efforts, and implementing related training programs;

  • Ensure privacy practices align with regulatory and compliance standards by identifying potential areas of vulnerability and developing and executing risk mitigation action plans;

  • Champion privacy awareness across the firm by leading Privacy Awareness campaigns, training and educational programs to help ensure privacy considerations and embedded in business processes.

What we value

These skills will help you succeed in this role

  • Ability to manage multiple simultaneous tasks in a high pressure, deadline-driven environment;

  • Strong abilities in analytical thinking, problem solving, research, time management, and verbal and written communication;

  • Qualified to collaborate with individuals across business lines and corporate functions;

  • Ability to take ownership and initiative, to negotiate, influence and build consensus and successfully navigate within a demanding and international environment of a leading global financial institution;

  • Embrace the appropriate stature, authority, and accountability to execute an operating model that adheres to an enterprise wide program;

  • Ability to work well with a geographically dispersed group of privacy and risk management professionals;

  • Self-motivated and the ability to work with a high degree of independence.

Education & Preferred Qualifications

  • Certified Information Privacy Professional or Certified Information Privacy Manager Accreditation

  • Undergraduate college degree required, JD or MBA degrees preferred

  • Minimum of 10 years of experience working in an internal control, compliance, investigation or data function

  • Comprehensive knowledge of European data protection regulations and their application, including technical and organizational measures and procedures

  • Expert understanding of processes and information flows of business and corporate functions that manage customer and employee data as well as other confidential information

  • Proven experience in preparing and presenting  high-quality presentations to senior stakeholders, including the Board of Directors

  • Capable of leading global teams and producing high quality and/or final work product and solutions under strict regulatory or management deadlines

  • Strong problem solving skill and comfortable making logical decisions when faced with ambiguous requirements

  • Strong written and verbal communication skills – ability to communicate technically with stakeholders

  • Written and verbal communication skills in both English and German

About State Street

What we do. State Street is one of the largest custodian banks, asset managers and asset intelligence companies in the world. From technology to product innovation, we’re making our mark on the financial services industry. For more than two centuries, we’ve been helping our clients safeguard and steward the investments of millions of people. We provide investment servicing, data & analytics, investment research & trading and investment management to institutional clients.

Work, Live and Grow. We make all efforts to create a great work environment. Our benefits packages are competitive and comprehensive. Details vary by location, but you may expect generous medical care, insurance and savings plans, among other perks. You’ll have access to flexible Work Programs to help you match your needs. And our wealth of development programs and educational support will help you reach your full potential.

Inclusion, Diversity and Social Responsibility. We truly believe our employees’ diverse backgrounds, experiences and perspectives are a powerful contributor to creating an inclusive environment where everyone can thrive and reach their maximum potential while adding value to both our organization and our clients. We warmly welcome candidates of diverse origin, background, ability, age, sexual orientation, gender identity and personality. Another fundamental value at State Street is active engagement with our communities around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs and access to employee networks that help you stay connected to what matters to you.

State Street is an equal opportunity and affirmative action employer.

Discover more at StateStreet.com/careers



Source link

04May

Meet Multilogin: The Anti-Detect Browser for Web Scraping and Multi-Accounting


Facing constant frustration with slow and error-prone manual processes, many users struggle to bypass platform detections, especially when security concerns loom large over profile storage and access. Add to this the frustration of downtime, sluggish support, and the challenge of navigating security during multi-project team collaborations, and the need for a reliable solution becomes glaringly clear.

Meet Multilogin, an antidetect browser to tackle the above problems. It is a specialized tool designed to help users manage multiple online identities across various platforms. It offers advanced features that enable businesses to operate with greater security and flexibility, particularly when managing browser profiles and online accounts. Through sophisticated browser fingerprint masking and secure proxy integration, Multilogin allows users to mimic human behavior and avoid detection on platforms with strict anti-fraud measures.

Now, the latest version, Multilogin X, takes the capabilities further. With enhanced features for team collaboration, improved cloud-based profile storage, and advanced automation capabilities, Multilogin X offers a seamless experience for businesses dealing with multiple projects or requiring better collaboration between teams. Its innovative approach helps businesses bypass platform detections effortlessly, safeguard their online identities, and streamline digital operations.

Two solutions offered for different problems by the Multilogin X are as follows:

  1. Web Scraping and Automation:
    • Single API Calls: Multilogin X supports single API calls, simplifying the process of integrating the tool into your automated workflows. This allows you to automate tasks efficiently and scale operations seamlessly.
    • Prompt Launching with Local Profiles: Users can swiftly launch browser profiles with local configurations, reducing setup time and enabling rapid task execution. This flexibility improves efficiency, particularly for projects that involve repetitive scraping tasks.
    • ‘Headful’ Browsers for Efficient Scraping: Multilogin X allows users to launch ‘headful’ browser instances that replicate typical user behavior, making it easier to scrape websites while remaining undetected. These instances offer greater efficiency by mimicking human interactions, bypassing anti-bot measures.
  2. Multi-Accounting:
    • Maximize Your Chances for Staying Undetected: Multilogin X leverages advanced fingerprint masking and anti-detection technology to minimize detection risks across multiple accounts. Users can confidently operate on platforms implementing strict anti-fraud measures, ensuring each browser profile appears unique.
    • Ready-to-Use, Customizable Fingerprints: The platform provides an extensive range of fingerprints, enabling users to fine-tune profiles for different applications. This helps in creating distinct browser profiles that look genuine and individualized.
    • Rapid Account Creation: Multilogin X simplifies setting up new accounts across various platforms, allowing users to quickly create and manage multiple accounts. This feature’s efficiency is valuable for businesses that rely on multi-account setups for marketing, sales, or other digital operations.

Multilogin X Features and Benefits:

  1. Account Bans and Detection, Gone: 
    • Advanced Anti-Detection Technology: Multilogin employs pioneering anti-detect technology to ensure website browser fingerprints appear unique and consistent. This reduces the likelihood of detection and account bans by simulating realistic browsing patterns and hiding identifiable data points. It’s particularly useful for digital marketers, e-commerce sellers, and anyone needing multiple accounts that bypass platform restrictions.
  2. Create Browser Profiles in a Flash: 
    • Quick Profile Generation: The Quick Profile feature allows users to generate single-use browser profiles within seconds. This feature is designed for temporary tasks where quick setup and tear-down are crucial. Once the task is complete, profiles automatically delete themselves, eliminating manual cleanup and enabling more efficient completion.
  3. Teamwork Makes the Dream Work, Securely: 
    • Multi-Level Role Management: Multilogin provides comprehensive collaboration features through multi-level role management. Users can securely organize their teams by assigning different roles, from Owner to Launcher, each with distinct access levels. This promotes effective task delegation, protects sensitive data, and prevents redundancy and overlap in operations, making it ideal for large teams managing multiple projects.
  4. Light as a Feather, Fits Like a Glove: 
    • Lightweight Platform: Designed to be resource-efficient, Multilogin X provides smooth navigation and performance on high-end and older devices. Users can benefit from its powerful features without compromising system performance, making it versatile for various environments.
  5. We Speak Your Language, Literally: 
    • Comprehensive Multilingual Support: Multilogin’s team of experts offers 24/7 support in multiple languages, ensuring that users, regardless of their expertise level, receive assistance tailored to their needs. Whether troubleshooting or seeking optimization advice, the support team is ready to assist with any issue, big or small.

How does Multilogin X work?

Multilogin X works by creating and managing unique browser profiles that mimic real user behavior, providing each profile with distinct fingerprints to evade detection by platform algorithms. It uses advanced anti-detect technology to make each profile appear as a separate, genuine user, enabling activities like multi-account management, web scraping, and automation. Users can quickly create profiles with customizable settings for different tasks, while the cloud-based storage ensures profiles are securely saved and accessible across devices. Collaboration tools allow teams to share profiles efficiently, and automated workflows streamline repetitive tasks, helping businesses scale their digital operations smoothly and securely. It is based on the three below-mentioned pillars:

  • Browser Fingerprint Masking: Generates unique browser fingerprints for each profile, simulating human-like behavior and avoiding detection by anti-bot algorithms.
  • Proxy Integration: Assign different proxies to each profile, routing internet traffic through different IP addresses to mask the user’s location.
  • Profile Encryption: Encrypts all browser data for each profile, ensuring secure storage and transit of cookies, login details, and browsing history and protecting sensitive information from unauthorized access.

How to use Multilogin X?

Step 1: Register an account

  • Fill out the registration form and click “Create account“
  • Enter the verification code from your email (be sure to check your Social, Promo, and Spam folders)

Step 2: Get a subscription

  • Click “View plans”
  • Choose a subscription that fits your needs
  • Choose a payment method: Multilogin platform accept card*, PayPal, and crypto payments
  • Pay the invoice: The platform has this handy guide that will help if you get stuck
  • Click “Open Multilogin X” in the top-right corner

Step 3: Connect the agent

  • Download the agent for your OS
    • On a Mac, make sure your OS is 12 (Monterey) or newer
  • Click the downloaded file to open the installer
    • On Windows, right-click the file and choose “Run as administrator”
  • Follow the on-screen instructions to complete the installation
  • Click “Connect agent” and wait while Multilogin downloads all components and establishes the connection (wait time can be longer with slower connection speeds)

Step 4: Create a profile

  • Click “New profile” and enter its name in the top field
    • Operating system: choose your device’s OS for best results
    • Browser: Mimic is built on Chrome and Stealthfox – on Firefox
    • Storage type: choose cloud storage for seamless multi-device access and synchronization and local storage for exceptional speed and saving data on your device

Bonus step: Elevate your strategy

Use Cases of Multilogin X

Let’s explore some of the great across various industries cases offered by Multiulogin X:

Use Cases of Multilogin X In Different Sector

Improvements in Multilogin X compared to Multilogin

Let’s compare it with the current version of Multilogin. i.e., Multilogin X with Multilogin’s earlier version:

Conclusion

In conclusion, Multilogin X is a powerful tool for addressing the critical needs of businesses and individuals who require secure and efficient online identity management. Its advanced browser fingerprint masking, seamless proxy integration, and robust profile encryption offer unparalleled security and anonymity. It is ideal for various applications, from e-commerce and advertising to affiliate marketing and web scraping. Multilogin X empowers users to expand their digital operations confidently and efficiently by enabling streamlined automation, team collaboration, and scalable multi-account management. Whether safeguarding brands, enhancing ad campaigns, or exploring global markets, Multilogin X provides a reliable solution to these challenges.


Thanks to Multilogin for the thought leadership/ Educational article. Multilogin has supported and sponsored us in this content/article.


Asif Razzaq is the CEO of Marktechpost Media Inc.. As a visionary entrepreneur and engineer, Asif is committed to harnessing the potential of Artificial Intelligence for social good. His most recent endeavor is the launch of an Artificial Intelligence Media Platform, Marktechpost, which stands out for its in-depth coverage of machine learning and deep learning news that is both technically sound and easily understandable by a wide audience. The platform boasts of over 2 million monthly views, illustrating its popularity among audiences.




Source link

04May

SAP Data Engineer at Méthode


Lavorare in Méthode significa essere innovativi, propositivi e affrontare con entusiasmo ogni sfida. Cerchiamo persone che condividano la nostra visione, con la voglia di apprendere e la capacità di comunicare la propria esperienza, con con l’entusiasmo per crescere insieme.

Cosa Offriamo:

  • Sviluppiamo percorsi di crescita semestrali basati sul merito e piani formativi per un allenamento costante delle competenze trasversali e tecnico-professionali.
  • L’orario flessibile e lo smart working consentono di gestire in completa autonomia la pianificazione e lo spazio di lavoro.
  • Sono previsti buoni pasto per ogni giornata lavorativa, sia in sede che in smart working.

Queste sono solo alcune delle caratteristiche che da cinque anni ci hanno permesso di ottenere il riconoscimento di Great Place to Work.

La retribuzione prevista per la posizione è compresa tra 26.000 e 32.000 Euro, a seconda delle esperienze del candidato.

I dipendenti potranno inoltre beneficiare di un premio variabile legato al raggiungimento di obiettivi personali ed aziendali (circa 10% della RAL), convertibile in flexible-benefits grazie alla presenza di un piano welfare.

Cosa Cerchiamo:

Il/la candidato/a ideale ha maturato un’esperienza di almeno un anno nel ruolo e possiede i seguenti requisiti:

  • Master, Laurea, o equivalente formazione in discipline tecnico/scientifiche (matematica, statistica, computer science, ingegneria, economia).
  • Conoscenza del linguaggio SQL
  • Esperienza pratica su attività di analisi, disegno e implementazione di sistemi BI; in particolare nell’area DataWarehouse, DataLake e nell’implementazione flussi ETL.
  • Competenza e buona esperienza su SAP BW, SAP BW/4HANA .
  • Conoscenza lavorativa di almeno uno strumento di ETL: SAP Data Services, Oracle Data Integrator (ODI), SSIS o altri strumenti di ETL
  • Conoscenza lavorativa di almeno uno dei seguenti database: SAP Hana, Oracle o MSSQL.

Completano il profilo:

  • Capacità di comprendere problemi di business e proporre possibili soluzioni analitico/funzionali
  • Buona capacità di interpretazione dei requisiti e di comunicazione dei risultati agli stakeholder
  • Propensione al lavoro di gruppo

Il Contesto

I dati sono oggi una risorsa imprescindibile, la loro analisi può influenzare la strategia aziendale in quasi tutte le imprese: analizzarli però non è sufficiente! In Méthode siamo nati come specialisti di Business Intelligence e offriamo gli strumenti per trarre valore dalla Data Analysis.

Lo facciamo attraverso consulenza strategica all’innovazione e con le migliori tecnologie disponibili sul mercato, attraverso un lavoro in team multi-disciplinari, formati da persone con background diversi, dal Data Architect al Data Engineer dal Data Analyst al Data Scientist.

Dal 2004 forniamo alle aziende, in tutti i settori industriali e in tutte le aree e i processi aziendali, la consulenza per valorizzare le informazioni che raccolgono, gli strumenti per utilizzarli in maniera consapevole e guardare al futuro.



Source link

04May

Microsoft Senior Data Analyst at Méthode


Lavorare in Méthode significa essere innovativi, propositivi e affrontare con entusiasmo ogni sfida. Cerchiamo persone che condividano la nostra visione, con la voglia di apprendere e la capacità di comunicare la propria esperienza, con con l’entusiasmo per crescere insieme.

Cosa Offriamo:

  • Sviluppiamo percorsi di crescita semestrali basati sul merito e piani formativi per un allenamento costante delle competenze trasversali e tecnico-professionali.
  • L’orario flessibile e lo smart working consentono di gestire in completa autonomia la pianificazione e lo spazio di lavoro.
  • Sono previsti buoni pasto per ogni giornata lavorativa, sia in sede che in smart working.

Queste sono solo alcune delle caratteristiche che da cinque anni ci hanno permesso di ottenere il riconoscimento di Great Place to Work.

La retribuzione prevista per la posizione è compresa tra 34.000 e 44.000 Euro, a seconda delle esperienze del candidato.

I dipendenti potranno inoltre beneficiare di un premio variabile legato al raggiungimento di obiettivi personali ed aziendali (circa 10% della RAL), convertibile in flexible-benefits grazie alla presenza di un piano welfare.

Cosa Cerchiamo:

Il/la candidato/a ideale ha maturato un’esperienza di almeno un anno nel ruolo e possiede i seguenti requisiti:

  • Master, Laurea, o equivalente formazione in discipline tecnico/scientifiche (matematica, statistica, computer science, ingegneria, economia).
  • Conoscenza del linguaggio SQL
  • Conoscenza degli strumenti di Reporting: PowerBI Report Builder.
  • Conoscenza dell’ecosistema Azure, in particolare i servizi di data management (Data Factory, Synapse, Data Explorer).
  • Conoscenza degli strumenti di ETL: SSIS.
  • Esperienza nella valutazione e analisi dei requisiti, progettazione e sviluppo di report, dashboard e strutture di metadati

Completano il profilo:

  • Capacità di comprendere problemi di business complessi e proporre possibili soluzioni analitiche/funzionali a supporto delle decisioni
  • Perspicacia nell’interpretazione dei requisiti e buona capacità di comunicazione dei risultati agli stakeholder, facendo percepire il valore a tutti i livelli aziendali
  • Propensione al lavoro di gruppo e alla leadership

Il Contesto

I dati sono oggi una risorsa imprescindibile, la loro analisi può influenzare la strategia aziendale in quasi tutte le imprese: analizzarli però non è sufficiente! In Méthode siamo nati come specialisti di Business Intelligence e offriamo gli strumenti per trarre valore dalla Data Analysis.

Lo facciamo attraverso consulenza strategica all’innovazione e con le migliori tecnologie disponibili sul mercato, attraverso un lavoro in team multi-disciplinari, formati da persone con background diversi, dal Data Architect al Data Engineer dal Data Analyst al Data Scientist.

Dal 2004 forniamo alle aziende, in tutti i settori industriali e in tutte le aree e i processi aziendali, la consulenza per valorizzare le informazioni che raccolgono, gli strumenti per utilizzarli in maniera consapevole e guardare al futuro.



Source link

03May

A Novel AI Approach to Enhance Language Models: Multi-Token Prediction


Language models are incredibly powerful tools that can understand and generate human-like text by learning patterns from massive datasets. However, the traditional method of training these models, called “next-token prediction,” has its limitations. It essentially teaches the model to predict the next word in a sequence, but this approach can lead to suboptimal performance, especially for more complex tasks.

The researchers behind this study propose a new technique called multi-token prediction. Instead of predicting one token (word) at a time, this method trains the model to predict multiple future tokens simultaneously. Imagine it like this: While learning a language, instead of guessing one word at a time, you’re challenged to predict entire phrases or even sentences. Sounds intriguing, right?

So, how does this multi-token prediction work? The researchers designed a model architecture with a shared trunk that produces a latent representation of the input context. This shared trunk is then connected to multiple independent output heads, each responsible for predicting one of the future tokens. For example, if the model is set to predict four future tokens, it will have four output heads working in parallel.

During training, the model is fed a text corpus, and at each position, it is tasked with predicting the next n tokens simultaneously. This approach encourages the model to learn longer-term patterns and dependencies in the data, potentially leading to better performance, especially for tasks that require understanding the broader context.

Moreover, the researchers also tackled a critical challenge: reducing the GPU memory usage of these multi-token predictors. They implemented a clever technique that sequentially computes the forward and backward passes for each output head, accumulating gradients at the shared trunk. This approach reduces the peak GPU memory utilization, making it feasible to train larger models efficiently.

The researchers conducted extensive experiments, and the results are quite promising. They found that multi-token prediction becomes increasingly useful as the model size grows. For instance, on coding evaluation benchmarks like MBPP and HumanEval, models trained with multi-token prediction outperformed their next-token prediction counterparts, sometimes by a significant margin. The 13B parameter models solve 12% more problems on HumanEval and 17% more on MBPP than comparable next-token models.

Moreover, the additional output heads can be leveraged to speed up inference using techniques like speculative decoding. The researchers observed up to a 3x speedup in decoding times for their best 4-token prediction model on code and natural language tasks.

But it’s not just about coding; multi-token prediction also showed promising results in natural language tasks. When evaluated on summarization benchmarks, models trained with multi-token prediction achieved higher ROUGE scores compared to the next-token baseline, indicating better text generation capabilities.

The next interesting question to answer is, “Why It Works?”

The researchers offer some insightful explanations for why multi-token prediction works so well. One key idea is that it mitigates the distributional discrepancy between training-time teacher forcing (where the model receives the ground truth for each future token) and inference-time autoregressive generation (where the model generates tokens without guidance).

Additionally, multi-token prediction implicitly assigns higher weights to tokens that represent “choice points” – decisions that significantly impact the remainder of the text. By reinforcing these critical decision points during training, the model learns to make better choices, leading to more coherent and useful text generations. Furthermore, an information-theoretic analysis suggests that multi-token prediction encourages the model to focus on predicting highly relevant tokens for the subsequent text, potentially capturing longer-term dependencies more effectively.

While the results are promising, the researchers acknowledge that there is still room for improvement. One area for future exploration is automatically determining the optimal value of n (the number of future tokens to predict) based on the task and data distribution. Additionally, they suggest that adjusting the vocabulary size and exploring alternative auxiliary prediction losses could lead to even better trade-offs between compressed sequence length and computational efficiency. Overall, this research opens up exciting avenues for enhancing language models’ capabilities, paving the way for more powerful and efficient natural language processing systems.


Check out the PaperAll credit for this research goes to the researchers of this project. Also, don’t forget to follow us on Twitter. Join our Telegram Channel, Discord Channel, and LinkedIn Group.

If you like our work, you will love our newsletter..

Don’t Forget to join our 41k+ ML SubReddit


Vineet Kumar is a consulting intern at MarktechPost. He is currently pursuing his BS from the Indian Institute of Technology(IIT), Kanpur. He is a Machine Learning enthusiast. He is passionate about research and the latest advancements in Deep Learning, Computer Vision, and related fields.






Source link

Protected by Security by CleanTalk