Skip to content

2022

FinTech Security and Regulation

As a FinTech consultant, I am conducting a study on the security and regulation of virtual banking in the US financial sector. The federal and state governments in the United States have various agencies that regulate and oversee financial markets and businesses. Each of these agencies has a distinct set of tasks and responsibilities, allowing them to operate independently while pursuing similar objectives.

The United States operates under a "dual banking system," meaning that banks can be chartered by either one of the 50 states or by the federal government. Regardless of who charters the bank, it will have at least one federal supervisor. Below is a list of US banking regulations that virtual banks must adhere to.

Firstly, the Gramm-Leach-Bliley Act (GLBA) mandates that financial institutions—companies providing financial products or services like loans, financial or investment advice, or insurance—inform their customers about their information-sharing practices and protect sensitive data.

The principal data protection elements of the GLBA are outlined in the Safeguards Rule. The FTC's Privacy of Consumer Financial Information Rule (Privacy Rule) supplements the GLBA by providing additional privacy and security requirements. The GLBA is enforced by the FTC, federal banking agencies, other federal regulatory bodies, and state insurance oversight agencies.

For instance, the Safeguards Rule (16 CFR 314) requires financial institutions under FTC jurisdiction to have safeguards for protecting client information. Companies subject to this rule must ensure that their affiliates and service providers maintain customer data securely and implement their own protective measures.

Additionally, the Financial Privacy Rule (16 CFR Part 313) requires financial institutions to issue specific notices and adhere to certain limitations on the dissemination of nonpublic personal information. Unless an exception applies, financial institutions must inform both affiliated and non-affiliated third parties about their privacy policies and practices and allow consumers to opt out of sharing their nonpublic personal information with nonaffiliated third parties.

Secondly, the California Consumer Privacy Act of 2018 (CCPA) grants consumers more control over personal data collected by organizations. California consumers now have new privacy rights, including the right to know what personal information a business collects and how it is used and shared; the right to request the deletion of collected personal information (with some exceptions); the right to opt out of the sale of their personal information; and the right to non-discriminatory treatment for exercising their CCPA rights.

In November 2020, Californians voted to enact the California Privacy Rights Act (CPRA), which significantly expands existing privacy rules and will take effect on January 1, 2023. It's worth noting that the current "business-to-business" and "HR" exceptions will expire on the same date, making the full range of CPRA standards applicable to these types of personal information, which are currently largely exempt from the CCPA.

Thirdly, the NYDFS Cybersecurity Regulation (23 NYCRR 500) imposes strict cybersecurity standards on financial institutions in New York. Under this regulation, entities like banks, mortgage companies, and insurance providers must implement comprehensive cybersecurity plans and policies and maintain ongoing reporting systems for cybersecurity events.

Fourthly, the Information Technology Examination Handbook's "Outsourcing Technology Services Booklet" offers guidelines to help examiners and bankers evaluate the risk management processes involved in establishing, managing, and monitoring IT outsourcing relationships. Federal financial regulators have the authority to oversee all activities and records of a financial institution, whether performed by the institution itself or by a third party.

Fifthly, another section of the Information Technology Examination Handbook, the "Information Security" booklet, provides guidance on assessing the level of security risks to a financial institution's information systems. It encourages institutions to maintain robust information security programs that are supported by board and senior management, integrated into business processes, and clearly accountable for security tasks.

Sixthly, the Consumer Financial Protection Bureau (CFPB) has issued guidelines for its Information Technology Examination Procedures under Compliance Management Review. While institutions can outsource operational aspects of a product or service, they cannot delegate the responsibility for ensuring compliance with federal consumer financial regulations or managing the risks associated with service provider agreements.

In summary, virtual banks operating in the United States must comply with all the aforementioned regulations. This involves interpreting the rules, clarifying them, and preparing the necessary documentation. To achieve compliance, virtual banks will need to thoroughly analyze these requirements and take the appropriate steps to meet them.

Some of the key bank regulations in the United States include the following:

  1. Regulation B: This regulation aims to prevent discrimination in the credit application process. It outlines the procedures lenders must follow when obtaining and processing credit information. Under this regulation, lenders are prohibited from discriminating based on age, gender, race, nationality, or marital status.

  2. Community Reinvestment Act of 1977 via Rule BB: This Federal Reserve regulation encourages banks to lend to low- and moderate-income borrowers. It also requires institutions to disclose the communities they intend to serve and the types of credit they are willing to offer there.

  3. Home Mortgage Disclosure Act of 1975 via Regulation C: This regulation mandates that many financial institutions annually provide loan data about the communities to which they have offered residential mortgages.

  4. Regulation CC: This rule requires depository institutions to make funds available within specified time periods and inform customers about their funds' availability practices. It also includes measures to expedite the collection and return of unpaid checks.

  5. Regulation D: This regulation imposes reserve requirements on certain deposits and other liabilities of depository institutions for monetary policy purposes.

  6. Regulation DD: Financial institutions are obligated to inform customers about annual percentage yields, interest rates, minimum balance requirements, account opening disclosures, and fee schedules. This regulation applies to personal accounts, not corporate or organizational accounts.

  7. Regulation E: This regulation establishes standards for electronic funds transfers, specifying the responsibilities of both consumers and financial institutions. It covers actions consumers must take to report issues and the steps banks must follow to offer remedies.

  8. Regulation H: This rule requires member banks to implement security measures against specific offenses, as outlined by the Bank Protection Act. Member banks are also required to report suspicious activities under this regulation.

  9. Servicemembers Civil Relief Act (SCRA): This federal law protects military personnel as they prepare to enter active service, covering a range of topics such as rental agreements, evictions, and interest rates on various forms of credit.

  10. Bank Secrecy Act (BSA): Also known as the Currency and Foreign Transactions Reporting Act, this regulation mandates that financial institutions report certain cash transactions exceeding $10,000.

  11. Unlawful Gambling Enforcement Act (UIGEA/Regulation GG): This regulation prohibits transactions related to illegal internet gambling.

  12. Regulation M: Known as Subchapter M, this IRS regulation allows investment companies to pass on capital gains, dividends, and interest to individual investors without double taxation.

  13. Regulation O: This rule limits the credit extensions that a member bank can offer to its executive officers, major shareholders, and directors.

  14. Regulation T: This regulation governs investor cash accounts and the credit that brokerages may extend for the purchase of securities.

  15. Regulation U: This regulation restricts the leverage that can be used in buying securities with loans secured by those securities.

  16. Regulation V: This rule requires all entities that provide information to consumer reporting agencies to ensure the information is accurate.

  17. Regulation W: This Federal Reserve regulation restricts certain transactions between banks and their affiliates.

  18. Regulation X: This sets credit limits for foreign individuals or organizations purchasing U.S. Treasury securities.

  19. Regulation Y: This governs the conduct of corporate bank holding companies and some state-member banks.

  20. Regulation Z: Also known as the Truth in Lending Act, this regulation aims to ensure that loan terms are communicated clearly, enabling consumers to easily compare credit arrangements.

In conclusion, the above overview outlines the U.S. banking authorities and regulations that virtual banks must comply with.

FinTech Security and Regulation

As a FinTech consultant, I am conducting a study on the security and regulation of virtual banking in the US financial sector. The federal and state governments in the United States have various agencies that regulate and oversee financial markets and businesses. Each of these agencies has a distinct set of tasks and responsibilities, allowing them to operate independently while pursuing similar objectives.

The United States operates under a "dual banking system," meaning that banks can be chartered by either one of the 50 states or by the federal government. Regardless of who charters the bank, it will have at least one federal supervisor. Below is a list of US banking regulations that virtual banks must adhere to.

Firstly, the Gramm-Leach-Bliley Act (GLBA) mandates that financial institutions—companies providing financial products or services like loans, financial or investment advice, or insurance—inform their customers about their information-sharing practices and protect sensitive data.

The principal data protection elements of the GLBA are outlined in the Safeguards Rule. The FTC's Privacy of Consumer Financial Information Rule (Privacy Rule) supplements the GLBA by providing additional privacy and security requirements. The GLBA is enforced by the FTC, federal banking agencies, other federal regulatory bodies, and state insurance oversight agencies.

For instance, the Safeguards Rule (16 CFR 314) requires financial institutions under FTC jurisdiction to have safeguards for protecting client information. Companies subject to this rule must ensure that their affiliates and service providers maintain customer data securely and implement their own protective measures.

Additionally, the Financial Privacy Rule (16 CFR Part 313) requires financial institutions to issue specific notices and adhere to certain limitations on the dissemination of nonpublic personal information. Unless an exception applies, financial institutions must inform both affiliated and non-affiliated third parties about their privacy policies and practices and allow consumers to opt out of sharing their nonpublic personal information with nonaffiliated third parties.

Secondly, the California Consumer Privacy Act of 2018 (CCPA) grants consumers more control over personal data collected by organizations. California consumers now have new privacy rights, including the right to know what personal information a business collects and how it is used and shared; the right to request the deletion of collected personal information (with some exceptions); the right to opt out of the sale of their personal information; and the right to non-discriminatory treatment for exercising their CCPA rights.

In November 2020, Californians voted to enact the California Privacy Rights Act (CPRA), which significantly expands existing privacy rules and will take effect on January 1, 2023. It's worth noting that the current "business-to-business" and "HR" exceptions will expire on the same date, making the full range of CPRA standards applicable to these types of personal information, which are currently largely exempt from the CCPA.

Thirdly, the NYDFS Cybersecurity Regulation (23 NYCRR 500) imposes strict cybersecurity standards on financial institutions in New York. Under this regulation, entities like banks, mortgage companies, and insurance providers must implement comprehensive cybersecurity plans and policies and maintain ongoing reporting systems for cybersecurity events.

Fourthly, the Information Technology Examination Handbook's "Outsourcing Technology Services Booklet" offers guidelines to help examiners and bankers evaluate the risk management processes involved in establishing, managing, and monitoring IT outsourcing relationships. Federal financial regulators have the authority to oversee all activities and records of a financial institution, whether performed by the institution itself or by a third party.

Fifthly, another section of the Information Technology Examination Handbook, the "Information Security" booklet, provides guidance on assessing the level of security risks to a financial institution's information systems. It encourages institutions to maintain robust information security programs that are supported by board and senior management, integrated into business processes, and clearly accountable for security tasks.

Sixthly, the Consumer Financial Protection Bureau (CFPB) has issued guidelines for its Information Technology Examination Procedures under Compliance Management Review. While institutions can outsource operational aspects of a product or service, they cannot delegate the responsibility for ensuring compliance with federal consumer financial regulations or managing the risks associated with service provider agreements.

In summary, virtual banks operating in the United States must comply with all the aforementioned regulations. This involves interpreting the rules, clarifying them, and preparing the necessary documentation. To achieve compliance, virtual banks will need to thoroughly analyze these requirements and take the appropriate steps to meet them.

Some of the key bank regulations in the United States include the following:

  1. Regulation B: This regulation aims to prevent discrimination in the credit application process. It outlines the procedures lenders must follow when obtaining and processing credit information. Under this regulation, lenders are prohibited from discriminating based on age, gender, race, nationality, or marital status.

  2. Community Reinvestment Act of 1977 via Rule BB: This Federal Reserve regulation encourages banks to lend to low- and moderate-income borrowers. It also requires institutions to disclose the communities they intend to serve and the types of credit they are willing to offer there.

  3. Home Mortgage Disclosure Act of 1975 via Regulation C: This regulation mandates that many financial institutions annually provide loan data about the communities to which they have offered residential mortgages.

  4. Regulation CC: This rule requires depository institutions to make funds available within specified time periods and inform customers about their funds' availability practices. It also includes measures to expedite the collection and return of unpaid checks.

  5. Regulation D: This regulation imposes reserve requirements on certain deposits and other liabilities of depository institutions for monetary policy purposes.

  6. Regulation DD: Financial institutions are obligated to inform customers about annual percentage yields, interest rates, minimum balance requirements, account opening disclosures, and fee schedules. This regulation applies to personal accounts, not corporate or organizational accounts.

  7. Regulation E: This regulation establishes standards for electronic funds transfers, specifying the responsibilities of both consumers and financial institutions. It covers actions consumers must take to report issues and the steps banks must follow to offer remedies.

  8. Regulation H: This rule requires member banks to implement security measures against specific offenses, as outlined by the Bank Protection Act. Member banks are also required to report suspicious activities under this regulation.

  9. Servicemembers Civil Relief Act (SCRA): This federal law protects military personnel as they prepare to enter active service, covering a range of topics such as rental agreements, evictions, and interest rates on various forms of credit.

  10. Bank Secrecy Act (BSA): Also known as the Currency and Foreign Transactions Reporting Act, this regulation mandates that financial institutions report certain cash transactions exceeding $10,000.

  11. Unlawful Gambling Enforcement Act (UIGEA/Regulation GG): This regulation prohibits transactions related to illegal internet gambling.

  12. Regulation M: Known as Subchapter M, this IRS regulation allows investment companies to pass on capital gains, dividends, and interest to individual investors without double taxation.

  13. Regulation O: This rule limits the credit extensions that a member bank can offer to its executive officers, major shareholders, and directors.

  14. Regulation T: This regulation governs investor cash accounts and the credit that brokerages may extend for the purchase of securities.

  15. Regulation U: This regulation restricts the leverage that can be used in buying securities with loans secured by those securities.

  16. Regulation V: This rule requires all entities that provide information to consumer reporting agencies to ensure the information is accurate.

  17. Regulation W: This Federal Reserve regulation restricts certain transactions between banks and their affiliates.

  18. Regulation X: This sets credit limits for foreign individuals or organizations purchasing U.S. Treasury securities.

  19. Regulation Y: This governs the conduct of corporate bank holding companies and some state-member banks.

  20. Regulation Z: Also known as the Truth in Lending Act, this regulation aims to ensure that loan terms are communicated clearly, enabling consumers to easily compare credit arrangements.

In conclusion, the above overview outlines the U.S. banking authorities and regulations that virtual banks must comply with.

My Operating Manual as a Manager

I recently completed an online course on becoming a Complete Manager. One valuable lesson was the importance of creating an operating manual explicitly designed to help others understand the best ways to work with me. The manual serves to accelerate relationship-building with my teammates. I share it during one-on-one conversations, reinforcing the resiliency of my relationships and enabling quicker trust repair in the event of conflicts.

Ways of Working - Communication

Preferences for Receiving Feedback

  • Be honest and assume positive intent.
  • No surprises. Communicate issues early and often; I can't fix what I don't know.
  • Be specific and use examples rather than vague arguments. Make any assumptions about me explicit.

Preferences for Giving Feedback

  • Opt for 1:1 private meetings over group settings.
  • Base discussions on facts rather than subjective biases. Be rational, not emotional.
  • Provide constructive suggestions.

Forms of Communication

  • Use Slack for internal team messages and respond as promptly as possible. Quick questions will come via Slack.
  • Utilize email for external clients and Google Meet for extended discussions. Please provide advance notice so I can prepare.
  • Reserve in-person interactions for social activities and team building. I won't contact my team via WhatsApp during non-office hours.

Ways of Working - Time Management

  • My peak focus time for independent work like software development or document writing is in the morning. Feel free to interrupt for urgent matters.
  • I collaborate best in the afternoons during team meetings or casual catch-ups for team-building activities.

Calendar Scheduling

  • Send Google Calendar invites and either accept or reject them. If the timing isn't ideal, propose a new time.
  • If you can't attend, decline the invite in advance and offer a brief explanation.
  • I generally arrive on time for meetings. If I anticipate being late, I'll inform you via Slack.

Ways of Working - Information

Preference for Digesting Information

  • I prefer reading to listening, as it allows me to process information more quickly.
  • For detailed answers requiring analysis, communicate asynchronously. For quick guesses, synchronous communication is fine.

Making Meetings Successful

  • Limit group size to fewer than nine people for meaningful conversation.
  • Keep meetings within an hour, focusing on interaction over process.
  • Be open-minded and ready to pivot when necessary.

Ways of Working - Getting it Right

What People Often Get Right About Me

  • I'm an introvert; networking events drain me quickly.
  • I'm a continuous learner with two master's degrees and various IT certifications.
  • I work more efficiently in an office than at home.

What People Often Underestimate About Me

  • My language skills are useful for APAC sales presentations.
  • Despite being introverted, I have a sense of humor and enjoy team camaraderie.
  • I am ambitious and goal-oriented, influenced by an Asian cultural emphasis on humility.

Ways of Working - What I Value Most

  • Continuous improvement: Competence is the foundation of good management.
  • Servant leadership: Team success over personal gains.
  • Agile mindset: Flexibility and adaptability in a dynamic work environment.

Ways of Working - Relationship

When Relationships are at Their Best

  • Diverse skills with clear roles and responsibilities.
  • Democratic decision-making and consensus-building.
  • Transparency, trust, and a harmonious atmosphere.

When Relationships are Frustrating or Stressful

  • Show empathy and avoid the blame game during frustrating times.
  • Don't distract with frequent status updates when I'm focused on challenging tasks.

In summary, this operating manual is an evolving document that reflects my management style and learning. If you'd like to discuss anything further, please feel free to reach out. I'm eager to collaborate with you.

作為經理的操作手冊

我最近完成了一門成為完整經理的在線課程。一個寶貴的課程,就是創建一份明確設計來幫助其他人理解與我一起工作的最佳方式的操作手冊的重要性。這份手冊有助於加強我與我的團隊成員建立關係。我在一對一的對話中分享這份手冊,進一步強化我的關係的韌性,且在衝突發生時能更快地恢復信任。

工作方式 -溝通

接收反饋的偏好

  • 誠實且總是樂觀地面對。
  • 沒有驚喜。提早且經常性地溝通問題;我無法修正我不知道的事情。
  • 具體且使用實例而不是模糊的爭論。將對我任何假設明確表達。

給予反饋的偏好

  • 選擇在1對1的私人會議中,而不是在團隊的設定中。
  • 基於事實而不是主觀偏見來討論。應該理性,而不是情緒化。
  • 提供建設性的建議。

溝通的方式

  • 使用Slack作為團隊內部信息,並盡快回覆。快問題將透過Slack 提出。
  • 使用電子郵件來應對外部客戶和Google Meet進行深入討論。提前通知我以便我做好準備。
  • 保留在離線互動的社交活動和團隊建設。我不會在非辦公時間透過 WhatsApp 聯繫我的團隊。

工作方式 -時間管理

  • 我最佳的獨立工作,如軟件開發或文件撰寫的集中時間是在早晨。如有急事,請隨時打斷我。
  • 我在下午的團隊會議或隨和的聊天中最佳的合作時間,這些都是團隊建設活動。

日曆安排

  • 發送Google日曆邀請,並接受或拒絕他們。如果時間不佳,提議新的時間。
  • 如果你不能出席,請提前拒絕邀請並提供簡短的說明。
  • 我通常會準時到達會議。如果我預見將會遲到,我將通過Slack 通知您。

工作方式 -信息

消化信息的偏好

  • 我寧願閱讀而不是聆聽,因為這讓我更快地處理信息。
  • 對於需要分析的詳細答案,進行異步溝通。對於快速的猜測,同步溝通就可以。

讓會議得到成功的方法

  • 把團隊規模限制在少於九人以進行有意義的對話。
  • 保持會議在一小時內,更加注重互動而不是過程。
  • 保持開放的心態,做好變革的準備。

工作方式 -做對的事情

人們常常對我做對的事情

  • 我是一個內向的人;社交活動消耗我相當多的精力。
  • 我是一個持續學習的人,有兩個碩士學位和各種IT證書。
  • 我在辦公室的工作效率比在家裡更高。

人們常常低估我

  • 我的語言技能對於APAC地區的銷售呈現非常有用。
  • 儘管是個內向的人,我有幽默感並喜歡團隊的歡愉。
  • 我是一個有雄心且以目標為導向的人,受亞洲文化對謙虛的強調影響。

工作方式 -我最重視的事情

  • 持續的改進:能力是良好管理的基礎。
  • 公僕領導者:團隊的成功高於個人的收益。
  • 敏捷的心態:在動態工作環境中的靈活性和適應性。

工作方式 -關係

當關係在最佳狀態時

  • 不同的技能具有明確的角色和責任。
  • 民主的決策製定和共識建立。
  • 透明度,信任和和諧的氣氛。

當關係令人沮喪或壓力時

  • 在受挫的時候要展示同情並避免指責遊戲。
  • 不要在我專注努力的任務時用狀態更新干擾我。

總的來說,這份操作手冊是一份關於我的管理風格和學習的進化文檔。如果您願意進一步討論任何事情,請隨時與我聯繫。我非常期待與您合作。

Azure EventHub, Logic Apps, and DataVerse

Kafka messages can be exported to and imported from Microsoft Cloud for Financial Services (FSI). This cloud solution offers various components, including a unified customer profile for managing customer data. It also has the capability to store personally identifiable information (PII). Data can flow from Kafka to Azure EventHub, and from there, Logic Apps can synchronize the data to DataVerse, which FSI can then consume. This workflow is illustrated in the diagram below:

To set up this connection, follow the steps below:

1. Sending Events to Azure EventHub

For example, you can use the Python script below to send three simple event messages to Azure EventHub.

import time
import os
import json
from azure.eventhub import EventHubProducerClient, EventData
from azure.eventhub.exceptions import EventHubError

# Replace placeholders with your EventHub name and connection string
EVENTHUB_NAME = "REPLACE_WITH_EVENTHUB_NAME"
CONNECTION_STR = "Endpoint=sb://REPLACE_WITH_CONNECTION_STRING.servicebus.windows.net/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=REPLACE_WITH_SHARED_ACCESS_KEY"

body = json.dumps({"id": "something"})

def send_event_data_batch(producer, i):
    event_data_batch = producer.create_batch()
    event_data_batch.add(EventData(body))
    producer.send_batch(event_data_batch)

producer = EventHubProducerClient.from_connection_string(
    conn_str=CONNECTION_STR,
    eventhub_name=EVENTHUB_NAME
)

start_time = time.time()
with producer:
    for i in range(3):
        send_event_data_batch(producer, i)

print("Sent messages in {} seconds.".format(time.time() - start_time))

Replace the placeholders for the EventHub name and connection string. If the message is sent successfully, you will see output similar to "Sent messages in 1.730254888534546 seconds."

If you encounter the error "Authentication Put-Token failed. Retries exhausted," double-check the placeholder values to ensure they are correct.

2. Connecting Azure EventHub to Logic Apps

Navigate to the Azure portal and search for Logic Apps. Create a new one to serve as your automated workflow. EventHub events will act as the trigger, and DataVerse will be the output. Choose "Consumption" as the plan type, which is suitable for entry-level development.

Once your Logic App is created, go to Development Tools and access the Logic App designer. The process involves three steps:

2.1 EventHub Trigger

The first step is to connect to EventHub as the trigger. For development purposes, set the check interval to 3 seconds.

2.2 Initialize Variables

The next step is to parse the message from EventHub. The sample message is:

{
  "id": "something"
}

To extract the value using the key "id," you can use the following expression:

json(decodeBase64(triggerBody()['ContentData']))['id']
2.3 Add a Row to DataVerse

The final step is to use the database connector to add a new row to the corresponding DataVerse table. If the table doesn't yet exist, navigate to https://make.powerapps.com/, select DataVerse, and then Tables to create one. Use the variable initialized in step 2 to populate the fields.

Once completed, save the workflow.

3. DataVerse

DataVerse serves as a database for storing data in tables. If the Logic App is successfully triggered when a new event is added, you will see a new row in the DataVerse table.

Finally, once all the data is synced to Azure FSI, you can navigate to the Microsoft Cloud Solution Center at https://solutions.microsoft.com/ to select the component you wish to use. For instance, you can select the Unified Customer Profile to manage customer data.

To launch the Dynamics 365 sandbox, navigate to the Solution Center and click the "Launch" button. The Unified Customer Profile app will display populated sample data.

Feel free to reach out if you have any questions about setting this up. Cheers.

Azure EventHub,Logic Apps,以及DataVerse

Kafka訊息可以從Microsoft Cloud for Financial Services (FSI)導出並導入到此雲端服務。這種雲端解決方案提供了各種組件,包括用於管理客戶數據的統一客戶資料。它還具有儲存個人可識別資訊(PII)的能力。數據可以從Kafka流向Azure EventHub,然後從那裡,Logic Apps可以將數據同步到DataVerse,FSI可以使用。下圖顯示了這一工作流程:

按照以下步驟設定此連接:

1. 向Azure EventHub發送事件

例如,您可以使用以下的Python代碼發送三個簡單的事件訊息到Azure EventHub。

import time
import os
import json
from azure.eventhub import EventHubProducerClient, EventData
from azure.eventhub.exceptions import EventHubError

# Replace placeholders with your EventHub name and connection string
EVENTHUB_NAME = "REPLACE_WITH_EVENTHUB_NAME"
CONNECTION_STR = "Endpoint=sb://REPLACE_WITH_CONNECTION_STRING.servicebus.windows.net/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=REPLACE_WITH_SHARED_ACCESS_KEY"

body = json.dumps({"id": "something"})

def send_event_data_batch(producer, i):
    event_data_batch = producer.create_batch()
    event_data_batch.add(EventData(body))
    producer.send_batch(event_data_batch)

producer = EventHubProducerClient.from_connection_string(
    conn_str=CONNECTION_STR,
    eventhub_name=EVENTHUB_NAME
)

start_time = time.time()
with producer:
    for i in range(3):
        send_event_data_batch(producer, i)

print("Sent messages in {} seconds.".format(time.time() - start_time))

替換EventHub名稱和連接字符串的佔位符。如果信息發送成功,您將看到類似於“在1.730254888534546秒內發送了信息。”的輸出。

如果您遇到“Authentication Put-Token failed. Retries exhausted.”錯誤,請再次檢查佔位符的值,確保它們是正確的。

2. 將Azure EventHub連接到Logic Apps

導航至Azure portal並搜索Logic Apps。創建一個新的自動化工作流程。EventHub的事件將作為觸發器,DataVerse將是輸出。選擇“Consumption”作為計劃類型,此為初級開發者適用。

創建Logic App後,轉到Development Tools並訪問Logic App designer。此過程涉及三個步驟:

2.1 EventHub触发器

首個步驟是將EventHub連接為觸發器。對於開發目的,請將檢查間隔設定為3秒。

2.2 初始化變量

下一步是解析來自EventHub的訊息。範例訊息是:

{
  "id": "something"
}

要使用key“id”提取值,您可以使用以下表達式:

json(decodeBase64(triggerBody()['ContentData']))['id']
2.3 向DataVerse添加一行

最後一步是使用數據庫連接器向對應DataVerse表添加一行新的資料。如果表還不存在,轉到https://make.powerapps.com/,選擇DataVerse,然後選擇Tables來創建一個。使用在步驟2中初始化的變量填充字段。

完成後,保存工作流程。

3. DataVerse

DataVerse作為一個數據庫,用於在表格中儲存資料。如果在添加新事件時成功觸發了Logic App,您將在DataVerse表中看到一行新的資料。

最後,一旦所有數據都同步到Azure FSI,您可以導航至Microsoft Cloud Solution Center在https://solutions.microsoft.com/選擇您希望使用的組件。例如,您可以選擇統一客戶資料來管理客戶數據。

要啟動Dynamics 365沙箱,導航至Solution Center並單擊“Launch”按鈕。統一客戶資料應用將顯示填充的示例數據。

如果您對設置此內容有任何問題,請隨時聯絡我。乾杯。

Journal of Self-Growth

One area in my life that has always intimidated me is social interaction—meeting new people, talking to strangers, and building connections. My fear of failure, embarrassment, and rejection has made this a challenging aspect of my life to improve, but it's a challenge I am determined to meet.

Growing up, I often felt lonely at school. I found solace in reading history books rather than in the boisterous games of my peers. I also observed the bullying that occurred in my school, where students would ridicule others for their appearance or intelligence. My solution was to distance myself from others to avoid becoming a target. This avoidance strategy stemmed from the traumatic experiences that have left an indelible impression on me. The idea of being unpopular filled me with dread.

However, as I've come to understand, establishing good relationships can significantly enhance one's quality of life. Online popularity can lead to a higher income, a better career, and increased self-confidence, not to mention reduced stress levels. To improve my soft skills and foster better interactions, I need to let go of my past negative experiences and be more open to socializing. Self-reflection is key. I need to question some of my ingrained assumptions, differentiate facts from misconceptions, and adopt a more collaborative and curious attitude towards others.

By honing my soft skills, I believe I can unlock greater success and fulfillment in my life.

自我成長期刊

我生活中一直讓我畏懼的一個區域是社交互動 - 認識新朋友,與陌生人交談,和建立連繫。我對失敗、尷尬和被拒絕的恐懼使我在這一生活方面的提高充滿了挑戰,但這是一個我決心要去面對的挑戰。

在我長大的過程中,我經常在學校感到孤獨。我在閱讀歷史書籍而不是參與同儕吵鬧的遊戲中找到慰藉。我還觀察到學校中發生的欺凌事件,學生們會因為他人的外貌或智力而嘲笑他們。我選擇遠離他人以免自己成為目標。這種逃避策略源於對我留下不可磨滅印象的創傷經歷。對不受歡迎的概念充滿了恐懼。

但是,如我所了解,建立良好的關係可以顯著提高生活質量。在線受歡迎可以帶來更高的收入,更好的職業,更高的自信心,更不用說降低壓力水平了。要提升我的軟技能並促進更好的互動,我需要釋放我的過去的消極經歷並更開放地對待社交。自我反思非常重要。我需要質疑一些我固有的假設,區分事實與誤解,並對他人采取更合作和好奇的態度。

通過提升我的軟技能,我相信我可以在我的生活中解鎖更大的成功和滿足。

FinTech - Digital Banking Overview and Market Research

In the Asia-Pacific region, large banks face challenges from emerging digital banks. The adoption of digital banking is growing globally, fueled by changing customer expectations and increased digital penetration. The COVID-19 pandemic has further accelerated this trend, compelling a more immediate need for change.

For example, in Hong Kong, large banks like HSBC are responding to competition from virtual banks. HSBC launched the PayMe mobile application well after the introduction of AliPayHK and WeChatPay in Hong Kong. Despite the late start, PayMe has amassed two million users and secured an impressive 68% market share. In addition to intensifying their digital transformation efforts, many of Hong Kong's large banks are eliminating or reducing fees to compete with newcomers.

In Malaysia, the underinvestment in technology by traditional banks raises concerns about their ability to compete with incoming virtual banks. FinTech developments are rapidly changing the financial sector landscape, with nearly 200 FinTech startups reported as of April 2019. The most significant growth areas include e-wallets and payment services. Mobile and internet banking penetration reached close to 34% and around 90%, respectively, in 2018.

Thailand also presents a robust digital and mobile penetration, making it well-positioned to become a key ASEAN FinTech hub. Although 22% of the Thai population is unbanked, high digital payments and peer-to-peer lending platforms target this demographic. The volume of mobile and internet banking transactions has grown rapidly, with mobile banking expanding at a 123% Compound Annual Growth Rate (CAGR) from 2014 to 2018.

Overall, the trend favoring virtual banks is extending across the Asia-Pacific region. Regulatory bodies like the Financial Supervisory Commission (FSC) in Taiwan and the Monetary Authority of Singapore (MAS) have recently approved new virtual bank licenses. Countries with large underbanked and unbanked populations, such as the Philippines, Vietnam, and Indonesia, offer compelling cases for the introduction of virtual banking.

In London, JPMorgan Chase is entering the UK market with a digital-only lender, marking its first retail bank overseas in its 222-year history. Initially offering current accounts with a rewards program, Chase plans to expand into personal lending, investment, and eventually, mortgages.

In New York, Tier 1 banks dominate the market, charging high fees while showing little demand for new products and instant payments. However, the city seems to be following digital banking trends in the Asia-Pacific region, and changes are on the horizon.

In Tokyo, the Japanese FinTech market has seen rapid growth, with revenues expected to reach HKD80 billion by 2022. Most of the top-funded FinTech applications focus on cryptocurrency, investment management, and trading. Demographic trends like a declining and aging population have led to decreased profits in the overall banking industry.

In other large markets, digital banking is experiencing a period of significant growth. Traditional banks, initially slow to adapt, must navigate a highly regulated and complex landscape to remain competitive. The scarcity of digital talent has further hindered this transition, making it essential for established banks to adapt quickly to protect their market share against emerging challengers.

金融科技 - 數位銀行概覽及市場研究

在亞太地區,大型銀行面臨來自新興數位銀行的挑戰。數位銀行的採用在全球範圍內持續增長,其動力來自於客戶期望的變化和數碼滲透率的提高。COVID-19疫情更進一步加速了這種趨勢,使得改變的需要更為迫切。

例如,在香港,像滙豐這樣的大型銀行正對虛擬銀行的競爭做出回應。滙豐在香港引入AliPayHK和微信支付後才推出了PayMe手機應用程式。儘管起步晚,但PayMe已經吸引了二百萬用戶,並獲得了令人印象深刻的68%市場份額。除了加大數位轉型的力度,香港的許多大型銀行也在消除或降低費用以與新進入者競爭。

在馬來西亞,傳統銀行在科技方面的投資不足引發了人們對其是否能夠與即將到來的虛擬銀行競爭的疑慮。金融科技的發展正在快速改變金融領域的格局,截至2019年4月,報告的金融科技初創公司近200家。最重要的增長領域包括電子錢包和支付服務。手機和網路銀行滲透率在2018年分別接近34%和約90%。

泰國也呈現出強大的數位和手機滲透率,使其有望成為東盟金融科技中心的關鍵位置。儘管泰國有22%的人口未被銀行涵蓋,但高額的數位付款和P2P借貸平台則針對這一族群。手機和網路銀行交易量已經快速增長,其中手機銀行在2014年至2018年期間的複合年增長率(CAGR)達到123%。

總的來說,偏好虛擬銀行的趨勢正在擴展到整個亞太地區。如台灣的金融監督管理委員會(FSC)和新加坡的金融管理局(MAS)近期已經批准了新的虛擬銀行牌照。有大量未被銀行覆蓋的人口的國家,如菲律賓、越南和印尼,對引入虛擬銀行提出了有力的案例。

在倫敦,摩根大通將以一家僅數位的貸款機構進入英國市場,這是其222年歷史中首次在海外設立零售銀行。Chase初步提供的是帶有獎勵計劃的當前賬戶,並計劃擴展到個人貸款、投資,最終還將涵蓋抵押貸款。

在紐約,翹楚銀行主導著市場,它收取高額費用,對新產品和即時付款的需求卻很小。然而,這座城市似乎正在跟隨亞太地區的數位銀行趨勢,變革正在地平線上。

在東京,日本的金融科技市場已經見證了快速增長,預期到2022年收入將達到800億港元。大部分獲得最多資金的金融科技應用集中在加密貨幣、投資管理和交易上。像人口下降和老齡化這樣的人口變化趨勢導致整個銀行業的利潤下降。

在其他大型市場,數位銀行正在經歷一個重要的增長期。一開始適應力較差的傳統銀行,必須在一個高度監管和複雜的環境中導航以保持競爭力。數位人才的稀缺進一步阻礙了這種轉變,使得已建立的銀行必須快速適應以保護他們的市場份額免受新興挑戰者的影響。