For those who check the comments first to see what the article is about: The logs discussed here are access logs for web-based consumer-facing applications, how those access logs are analyzed in data pipelines, the privacy implications, and the legal implications of the privacy implications.
For those who check the comments first to see what the article is about: The logs discussed here are access logs for web-based consumer-facing applications, how those access logs are analyzed in data pipelines, the privacy implications, and the legal implications of the privacy implications.
A fantastic talk on the same topic: https://www.youtube.com/watch?v=GAXLHM-1Psk
This video is linked and quoted in the pieceā¦