Today’s episode of GenAI in the Enterprise features Raj Shah, a Machine Learning Engineer at Snowflake. Raj built his career talking to various companies and their data teams, showing them how #GenAI (and which tools) could help them reach their goals. Now at Snowflake, he gets to share Snowflake’s suite of #GenerativeAI tools, teaching them how to use them to …
GenAI in the Enterprise: Barron Stone, AI Product Lead at Defense Unicorns
Today on GenAI in the Enterprise, Zach talks to Barron Stone, the AI Product Lead at Defense Unicorns. Barron served in the Air Force for 12 years and is still currently serving as an active reservist. In the Air Force, Barron was an electrical engineer, which means the office was his battlefield. Now at Defense Unicorns, he has continued that …
Setting Up an LDAP Server Instance on AWS
This blog describes the basics of what it takes to get an existing LDAP server moved from the PV virtualization type to HVM. I encountered this situation personally while working for a client earlier this year. Efforts have been made to keep most of it generic enough to be useful for other situations involving system upgrades or replacements as well.
Applying Bloom Filters to Java Dev: A Naive Implementation
Over the course of this blog, I will be focusing on using Bloom Filters in Java development. Weโll briefly talk through what they are and why theyโre handy, and then weโll dive into a hypothetical use case and tutorial.
As a note, this post is just meant to get you started on the track to using a Bloom Filter in the wild. What we discuss here will stay high-level but will give you a general idea of how it would work on a project.
Without further ado, letโs get started.
Part 4: Creating an FHIR API – Wrapping Things Up
Welcome to the fourth and final installment of Creating an FHIR API with GCP. So far, weโve covered a lot!
We discussed the differences between Google and Azure, landing on GCP as the best option for FHIR in Part 1. We began our implementation in Part 2, creating both the BigQuery resources and your FHIR repository resources. And finally, in Part 3, we tackled authentication methods and populating data in our FHIR repository.
This time, weโll wrap everything up with a nice little bow. First, weโll finish our implementation, and then, Iโll share the limitation I found – for the sake of transparency. Letโs dive in.



