Articles

  • Dec 7, 2024 | dev.to | Lulu Cheng

    Many data platforms today are built bottom-up, starting with collecting data that "might be useful later" and gradually patching together solutions as needs arise. This approach inevitably leads to fragmented implementation, mounting cost and technical debt. Data system design requires specialized expertise across data modeling, distributed systems, security, and compliance.

  • Nov 13, 2024 | dev.to | Lulu Cheng

    Today, we have access to highly scalable data tools handling massive volumes that would have been unthinkable just a few years ago. LLMs process billions of parameters, streaming platforms handle millions of events per second, and data warehouses that can easily scale to petabytes. Ironically, while individual tools are more scalable than ever, organizations find themselves struggling with increasingly unscalable data platforms.

  • Nov 8, 2024 | dzone.com | Lulu Cheng

    Encryption is one of the most effective data security strategies, alongside access control, software updates, and network segmentation. However, adding encryption to an existing tech stack can be challenging. Data pipelines aren’t typically designed to handle encryption and decryption, leading to additional migration work, operational complexity, and higher compute costs. Data encryption presents its own challenges in modern times.

  • Oct 27, 2024 | dev.to | Lulu Cheng

    Infrastructure and internal platform adoption don’t typically happen organically. In the best-case scenario, adoption happens through partnerships with product teams to enable feature development or provisioning automation. However, in many cases, particularly in the worst-case scenario, platforms are forcibly “adopted” by product teams through migrations. To set the stage, migrations are bad.

  • Oct 15, 2024 | dev.to | Lulu Cheng

    Despite more and more money spent on data security, data breaches continue to occur. Security, platform, and data engineering teams often operate with differing priorities, leading to fragmented solutions that address symptoms rather than the root causes. While there are many exciting new products in developer tools in cloud and app security with varying levels of success, there are currently no similar tools to empower engineers specifically in data security.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
4K
Tweets
4K
DMs Open
Yes
lulu cheng
lulu cheng @lulu_cheng
5 Mar 25

in hindsight all my therapist red flags can be summed up by~ don't trust a therapist with main character energy

lulu cheng
lulu cheng @lulu_cheng
30 Dec 24

i'm experimenting with a small number of openings for complimentary dyad coaching in 2025✌️✨ https://t.co/Kd4flWshxg

lulu cheng
lulu cheng @lulu_cheng
6 Sep 24

sf straight men dating pool, pick >=2 - on the spectrum - in a polycule - "lives an active lifestyle" is most of the personality - looking for a cofounder in the "ai + therapy space" - obsessed with bryan johnson - checked slack 16x on ur date and has "a meditation practice"