diff --git a/docs/blog/2024-05-13-soc2-announcement.md b/docs/blog/2024-05-13-soc2-announcement.md deleted file mode 100644 index 295a60ae..00000000 --- a/docs/blog/2024-05-13-soc2-announcement.md +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: Groundlight AI Achieves SOC 2 Type 2 Compliance -description: Groundlight AI Achieves SOC 2 Type 2 Compliance -slug: groundlight-ai-achieves-soc-2-type-2-compliance -authors: - - name: Phillipie Motley - title: Operations Manager - image_url: https://a-us.storyblok.com/f/1015187/1000x1000/1902e83e56/motleyp.jpg -tags: [soc-2] -hide_table_of_contents: false ---- - -# Groundlight AI Is Now SOC 2 Type 2 Compliant - -At Groundlight, we take data security and privacy extremely seriously. From the very beginning, we recognized the importance of implementing stringent controls and processes to safeguard our clients' sensitive information. That's why we made the decision early on to pursue SOC 2 compliance. - - - -## What is SOC 2 Verification - -For those unfamiliar, SOC 2 (Service Organization Control 2) is an auditing framework established by the American Institute of Certified Public Accountants (AICPA). It involves an in-depth external review of an organization's security policies, procedures, and controls by an independent auditor. Achieving SOC 2 certification demonstrates our unwavering commitment to maintaining the highest standards of data protection and privacy. - -### What Are the Different SOC 2 Types? - -**SOC 2 Type 1:** Evaluates an organization's cybersecurity controls at a single point in time. - -**SOC 2 Type 2:** Type 2 report assesses the operational effectiveness of controls over a defined period of time (3, 6, 12 months). - -## How Did Groundlight Achieve SOC 2 Compliance - -Achieving SOC 2 compliance is a marathon, not a sprint. It demands meticulous planning and dedication from teams across the entire organization. At Groundlight, we took a methodical approach by first establishing an audit timeline. From there, we worked backwards systematically to get our house in order. -Teams across engineering, security, operations, and more collaborated to implement rigorous security policies and controls. We overhauled processes for everything from access management to incident response handling. Robust evidence collection and documentation mechanisms were put into place. -Once we had thoroughly prepared, we brought in external auditors to conduct their independent evaluation. This was the high-stakes final exam. Our policies, technical safeguards, and control operations were stress-tested and scrutinized over an extended period. - -## What Does SOC 2 Verification Mean for Groundlight AI’s Data Security - -From day one, Groundlight has made data security and privacy a top priority. Safeguarding our customers' sensitive information is foundational to our business. So while achieving SOC 2 certification marks an important milestone, it simply reinforces practices that have been ingrained in our DNA all along. -We've never treated security as an afterthought or box to check. Instead, we've embraced building robust data protections into the core of our products and services from the ground up. Our policies, processes and technical controls are meticulously tailored to our unique operations - not generic one-size-fits-all measures. -SOC 2 compliance validates that we've institutionalized this security-first mindset across the entire organization. But it's just one step along our continuous journey. As data privacy regulations evolve and new threats emerge, we'll remain vigilant in regularly reassessing and elevating our safeguards. -By upholding the highest standards like SOC 2, we solidify the unshakable foundation of trust with our customers. Upholding these compliance standards unlocks new business opportunities and allows us to double down on our commitment to being steadfast in data security. - -## Key Takeaways of SOC 2 Verification - -- Prioritizing security and tailoring controls to our needs, not just checking boxes -- SOC 2 enables new business growth by meeting vendor security requirements -- Earning certification required full organizational commitment and stakeholder participation -- This marks an important milestone, but our security journey is never complete diff --git a/docs/blog/2024-05-15-active-learning.md b/docs/blog/2024-05-15-active-learning.md deleted file mode 100644 index 745bd07d..00000000 --- a/docs/blog/2024-05-15-active-learning.md +++ /dev/null @@ -1,86 +0,0 @@ ---- -title: "Reducing Data Labeling Costs with Uncertainty Sampling" -description: How Groundlight uses active learning to train accurate vision models while saving on data labeling costs. -slug: active-learning -authors: - - name: Ted Sandler - title: Senior Applied Scientist - image_url: https://a-us.storyblok.com/f/1015187/1000x1000/efc35da152/sandlert.jpg -tags: [active learning, uncertainty sampling, deep dive] -image: ./images/active-learning/dog-conf-high.png -hide_table_of_contents: false ---- - -At Groundlight, we train each detector's machine learning (ML) model on images that have been manually labeled with correct responses. However, collecting labels at scale becomes expensive because it requires human review. Given that detectors are frequently applied to streams of images that change slowly over time, reviewing all images as they arrive is likely to result in effort wasted on labeling similar images that add little information to the training set. - - - -## What is Active Learning in Machine Learning? - -To avoid unnecessary labeling and save customers money, Groundlight uses **[active learning](https://en.wikipedia.org/wiki/Active_learning_(machine_learning))**, a machine learning protocol in which the ML model plays an active role in determining which images get manually labeled for training. With active learning, only informative images are prioritized for review, making it possible to label small a subset of the available data but train a model that's roughly as good as one trained with all the data labeled [\[Settles, 2009\]](https://minds.wisconsin.edu/handle/1793/60660). - -## What is Uncertainty Sampling? - -The variant of active learning we use at Groundlight is based on **[uncertainty sampling](https://lilianweng.github.io/posts/2022-02-20-active-learning/#uncertainty-sampling)**, a well studied and effective method that can be used in either the streaming setting or the pool-based setting in which there exists a large reservoir of unlabeled examples to draw from. We operate in the stream-based setting, where images arrive one at a time and it must be decided in the moment whether to escalate an image for review. - -## How Does Uncertainty Sampling Work? - -Imagine we have a detector that processes a stream of images arriving one by one. The detector's ML model is trained on all images labeled up to that point in time. When a new image arrives, the model makes its best guess prediction for the new image and also reports its confidence in that prediction. The confidence is expressed as a probability (a number between zero and one) that the prediction is correct. - -In uncertainty sampling, we escalate those images whose predictions have low confidence so they can be manually reviewed and labeled. Conversely, we largely leave images with confident predictions unescalated and therefore unlabeled. In this way, we avoid the expense and effort of labeling images whose predictions are likely correct. But we still continue to label images the model is unsure of so it can improve on them. - -## An Example of Uncertainty Sampling - -As an example, the images shown below were sent to a detector that identifies the presence of dogs in and around a swimming pool at [Dogmode's Aquatic Center](https://dogmode.com/aquatic-fitness-center-pool-view/). The model reports with 95% confidence that there is a dog in the image on the left. But it is less confident in its response for the image on the right, saying there is no dog present with only 75% confidence. (There is in fact a dog at the back left corner of the pool, but it’s difficult to see.) -
![]() |
- ![]() |
-
Yes | No |