<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Capital One Tech - Medium]]></title>
        <description><![CDATA[The low down on our high tech from the engineering experts at Capital One. Learn about the solutions, ideas and stories driving our tech transformation. - Medium]]></description>
        <link>https://medium.com/capital-one-tech?source=rss----3db3a67cb648---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Capital One Tech - Medium</title>
            <link>https://medium.com/capital-one-tech?source=rss----3db3a67cb648---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 18 May 2026 01:29:58 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/capital-one-tech" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Spark tuning: executor optimization for performance]]></title>
            <link>https://medium.com/capital-one-tech/spark-tuning-executor-optimization-for-performance-c757b39f0efe?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/c757b39f0efe</guid>
            <category><![CDATA[open-source]]></category>
            <category><![CDATA[spark-executor]]></category>
            <category><![CDATA[software-engineering]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Thu, 30 Apr 2026 16:21:31 GMT</pubDate>
            <atom:updated>2026-04-30T16:21:32.513Z</atom:updated>
            <content:encoded><![CDATA[<h4>Learn how Spark executor tuning improves performance with fat, thin and optimal executors for efficient applications.</h4><h3>Introduction to Spark executor tuning</h3><p>Working with Spark is intimidating for new users. Distributed computing concepts to understand, parameters to tune and environments to configure, on top of writing the application code itself! It’s easy to use surface-level Spark knowledge to create an application that works, but developing efficient applications and achieving real performance improvements require a deeper dive into the details of Spark. One such case is <a href="https://spark.apache.org/documentation.html">Spark executor tuning</a>.</p><h3>Spark drivers, workers and executors</h3><p>Spark is an <a href="https://www.capitalone.com/tech/open-source/">open source</a> unified analytics engine for distributed processing of large volumes of data. Computations are split out over a series of clusters, enabling parallel processing and in turn speeding up execution. Each Spark application runs on a driver node and a series of worker nodes.</p><h4>The role of the driver in Spark applications</h4><p>The driver is the “brain,” running the main method of the application. The driver is responsible for building execution plans and orchestrating the computational tasks performed. It analyzes, schedules and sends tasks to worker nodes.</p><h4>The role of worker nodes in Spark clusters</h4><p>In contrast, the workers are the “brawn.” Each worker carries out computation tasks and returns the results to the driver.</p><figure><img alt="Diagram of a Spark job with driver and worker nodes running parallel tasks across executors in two stages." src="https://cdn-images-1.medium.com/max/1024/1*pxhpaQXMyrkkNjxMlJBWFQ.png" /></figure><h4>The role of executors in Spark jobs</h4><p>Spark jobs are broken down into a series of stages, each composed of tasks that run in parallel on worker node executors. A task is the smallest unit of work in a Spark application. A <a href="https://sparkbyexamples.com/spark/what-is-spark-executor/">Spark executor</a> is a process that runs on a worker node in a cluster and executes tasks assigned to it by the driver. Executors perform the actual data computations of a Spark application.</p><p>Each executor is allocated a certain amount of memory and CPU cores for storing data and performing computation tasks. By default, Spark creates a single executor for each worker node in a cluster, but users can change the number of executors and the memory and CPU allocated to each executor. This can often lead to improved performance depending on the application.</p><p>Details for executors can be configured by using the following Spark parameters when setting up an application: -num-executors, -executor-cores, -executor-memory.</p><h3>Fat vs. thin vs. optimal executors in Spark</h3><p>Executors in Spark can be configured in different ways-fat, thin or optimally sized-each with trade-offs in performance, cost and fault tolerance.</p><h4>Fat executors in Spark</h4><p>Since Spark creates one executor for each worker by default, these executors are “fat.” They contain all the CPU cores and memory available to the worker node. Fat executors can be beneficial for certain use cases, such as when an application is processing a large amount of data or when managing several executors becomes a concern.</p><ul><li>Since a fat executor has more cores, more tasks can be run in parallel (typically 1 core = 1 task), which can improve application performance.</li><li>An additional benefit of fat executors is enhanced data locality, as there is a greater chance of data being processed on a node where it is already stored. This reduces the amount of network traffic (data sent between workers), speeding up the application.</li></ul><p>While there are benefits to using fat executors, there are potential downsides:</p><ul><li>As all the memory and CPU for a worker sit on one executor, there is potential for resources being underutilized if some cores or portions of memory remain unused.</li><li>Fat executors have a lower fault tolerance in the event of an error, as all the resources for a worker are contained on a single executor. If that one executor goes down, the whole worker goes down.</li></ul><h4>Thin executors in Spark</h4><p>In direct contrast to fat executors are thin executors. Thin executors are minimally sized, oftentimes containing a single CPU core (or a small number of cores) and a fraction of the memory available to a worker node.</p><ul><li>Similar to fat executors, thin executors also increase parallelism, in this case because there are more executors available.</li><li>There is better fault tolerance due to the number of executors available in the cluster. If an executor goes down, it’s not the end of the world, and the amount of data being processed on each executor is small due to the limited memory on thin executors, so recomputation is easier.</li></ul><p>Thin executors are not perfect either, and there are negatives:</p><ul><li>A high amount of network traffic occurs between the driver and executors on each worker node. Since thin executors have less memory and fewer CPU cores, there will be more data sent across more executors as the driver assigns tasks and receives the results from workers.</li><li>For similar reasons, there is reduced data locality when using thin executors. More data is spread over more executors, and each executor has a smaller amount of memory, preventing it from storing a large quantity of data partitions locally.</li></ul><h3>Optimally sized executors in Spark</h3><p>As the name implies, optimally sized executors are configured to contain the ideal amount of memory and CPU cores for each executor on a worker node. Optimal executors are the Goldilocks solution: not too big, not too small, just right. This can lead to improved application performance by potentially reducing the run time of the application while better utilizing the resources configured. Optimal executors are determined by following the rules below.</p><h3>Rules for sizing optimal Spark executors</h3><p>Sizing Spark executors correctly requires following a few best-practice rules:</p><ol><li>Leave out 1 CPU core and 1 GB of RAM for the operating system per worker node.</li><li>Remove 1 executor (or 1 core and 1 GB of RAM) at the cluster level to account for resource management.</li><li>When calculating executor memory, leave out a certain amount to account for the memory overhead of internal system processes. The amount to leave out is MAX (384 MB, 10% of executor memory).</li><li>Ideally, have 3–5 CPU cores on each executor.</li></ol><h4>Example Spark configuration across 5 worker nodes</h4><p>Given what we now know about executors, let’s walk through an example. We’ll use a sample Spark configuration with 5 worker nodes, each containing 12 CPU cores and 48 GB of RAM. Our base cluster looks like this:</p><figure><img alt="Spark cluster with 5 worker nodes, each containing 12 CPU cores and 48 GB of RAM." src="https://cdn-images-1.medium.com/max/1024/1*ms4bJPrgy0y1WPzTviBkEw.png" /></figure><p>After following rule 1, we are left with 11 cores and 47 GB of RAM on each worker node.</p><figure><img alt="Spark worker nodes after applying rule 1, each with 11 cores and 47 GB RAM available for executors." src="https://cdn-images-1.medium.com/max/1024/1*rLOq8_bA5hVNVihMafHeTw.png" /></figure><p>Across the cluster (all 5 nodes), we have:</p><figure><img alt="Spark cluster totals across 5 nodes showing 235 GB RAM (47 GB each) and 55 cores (11 cores each)." src="https://cdn-images-1.medium.com/max/1024/1*h8rquh0bURgXBGqD9wTH8A.png" /></figure><p>Now, we follow rule 2. We could remove one full executor (which would likely be better for a thin executor case where we have many executors), but for this example, we will remove 1 GB of RAM and 1 core at the cluster level.</p><figure><img alt="Spark cluster totals after applying rule 2: 234 GB RAM (minus 1 GB) and 54 cores (minus 1 core) across executors." src="https://cdn-images-1.medium.com/max/1024/1*sTalTynBHdr9ofFxnhSqMw.png" /></figure><p>We want to use optimally sized executors across these 5 nodes and need to take into account rule 4, leveraging 3–5 cores per executor. We’ll choose 5 executors:</p><figure><img alt="Spark executor sizing example showing 5 cores per executor and ~21 GB memory per executor after overhead." src="https://cdn-images-1.medium.com/max/1024/1*Za-jtR93QvgIgNr9gytP7A.png" /></figure><p>The Spark configurations set for this example would be as follows:</p><figure><img alt="Spark config example showing 10 executors, 5 cores per executor and 21 GB memory per executor." src="https://cdn-images-1.medium.com/max/1024/1*afkEE5LPOXsIvnaVFgLvIw.png" /></figure><p>The following is a visualization of what the executors would look like in relation to the whole cluster, with each executor in purple:</p><figure><img alt="Optimally sized Spark executors across 5 worker nodes, each with 12 CPU cores and 48 GB RAM split into two executors." src="https://cdn-images-1.medium.com/max/1024/1*Bta2Tg3SoqtzA5G_HnQi_g.png" /></figure><h3>Conclusion: Spark executor tuning matters</h3><p>Spark executor tuning matters because performance, cost efficiency and reliability all hinge on how executors are configured. Ideally, this article provides a deeper understanding of what Spark executors are and how tuning them can lead to better performance and potential cost savings. As with many concepts in Spark, executor tuning is not an exact science and will likely require trial and error. This article should serve as an example that you can use to crunch the numbers and find the optimal configuration for your application. Enjoy tuning!</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/software-engineering/spark-tuning-executor-optimization/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>This blog was co-authored by Rudra Sinha, Senior Manager; Andrew Baak, Principal Associate and Tatum Bair, Principal Associate </em></strong><em>Rudra Sinha, Andrew Baak and Tatum Bair work in the data engineering space and boast extensive experience in data engineering and technical leadership. As a group of data engineering leaders, their passion is to explain their deep data engineering knowledge, acquired through extensive research, concept proofing and countless implementations.</em></p><p><strong><em>DISCLOSURE STATEMENT: </em></strong><em>© 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c757b39f0efe" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/spark-tuning-executor-optimization-for-performance-c757b39f0efe">Spark tuning: executor optimization for performance</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Insights from the inaugural Capital One AI Symposium]]></title>
            <link>https://medium.com/capital-one-tech/insights-from-the-inaugural-capital-one-ai-symposium-8b3f62471704?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/8b3f62471704</guid>
            <category><![CDATA[agentic-ai]]></category>
            <category><![CDATA[ai-research]]></category>
            <category><![CDATA[machine-learning]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Fri, 24 Apr 2026 15:52:24 GMT</pubDate>
            <atom:updated>2026-04-24T15:52:26.050Z</atom:updated>
            <content:encoded><![CDATA[<h4>Advancing the state of the art through multi-sector partnerships.</h4><figure><img alt="Prem Natarajan, PhD, delivers opening remarks on stage at Capital One’s inaugural AI Symposium" src="https://cdn-images-1.medium.com/max/1024/0*_rcyYgclVb-X6xC8.png" /></figure><p>At Capital One, we are deeply committed to advancing the frontier of artificial intelligence (AI) to solve meaningful industrywide challenges.</p><p>A key part of this mission is fostering long-term <a href="https://www.capitalone.com/tech/academia/">multi-sector ecosystems and partnerships</a> to advance the state of the art. Recently, we hosted our first-ever two-day AI Symposium in McLean, Virginia. The inaugural event was designed to deepen connections and foster insight-sharing between the scientific AI community, leading-edge startups and our own technology, data science and AI/machine learning leaders and partners.</p><h3>A multi-sector approach</h3><p>Across the two days, the symposium highlighted a critical shift in how we approach researching and building AI. Rather than siloing talent and insights within the confines of the university environment or the private sector, we must build sustainable, reciprocal models that strengthen both for broad societal benefit.</p><p>The AI Symposium showcased how academic research can play a defining role in enterprise without losing its scientific rigor.</p><h3>Day 1: The Academic Summit</h3><p>The first day focused on the latest breakthroughs in AI and related areas from top academics, applied scientists and engineering leaders. Key themes explored in these academic talks and discussions included:</p><p><strong>Human-AI Interaction:</strong> Professors Lydia Chilton of Columbia University and Mohit Bansal, director of the University of North Carolina at Chapel Hill MURGe Lab, discussed challenges and opportunities related to trust in AI systems, including the confidence obstacles impeding productivity and how addressing said obstacles can improve real-world applications in medicine, education and beyond.</p><p><strong>Creative Intelligence:</strong> Professors Heng Ji of the University of Illinois at Urbana-Champaign and Ellie Pavlick of Brown University explored how models can move beyond simple pattern-matching into complex reasoning to generate entirely novel solutions, alongside deep dives into how AI systems actually process information internally.</p><p><strong>Responsible Decision-Making and Quantum:</strong> Multi-sector panels, including researchers like Dr. Shih-Fu Chang, dean of Columbia Engineering, and Professor Gaurav Sukhatme, director of Advanced Computing at the University of Southern California, discussed the responsible implementation of AI in finance, the need for multisector innovation and considerations for the intersection of AI and quantum computing alongside experts from scientific federal agencies.</p><p>The Academic Summit was enriched by the participation of academic leaders from Capital One’s formal partnerships, including the <a href="https://www.capitalone.com/tech/ai/responsible-ai-partnership-usc/">Capital One University of Southern California Center for Responsible AI and Decision Making in Finance</a>; the <a href="https://www.capitalone.com/tech/ai/generative-ai-partnerships-with-uiuc/">Capital One Illinois Center for Generative AI Safety, Knowledge Systems, and Cybersecurity</a>; the <a href="https://www.capitalone.com/tech/ai/responsible-ai-partnership-columbia-university/">Columbia Center for AI and Responsible Financial Innovation</a>; the <a href="https://ml.umd.edu/">University of Maryland Center for Machine Learning</a>; the <a href="https://murgelab.cs.unc.edu/">University of North Carolina at Chapel Hill MURGe Lab</a>; the <a href="https://www.capitalone.com/tech/ai/uva-capital-one-data-science-fellows-2025-2027/">University of Virginia School of Data Science</a>; the <a href="https://www.capitalone.com/tech/ai/capital-one-uva-engineering-partnership/">University of Virginia School of Engineering</a>; and partners from the <a href="https://www.capitalone.com/tech/ai/capital-one-nsf-partnership-advances-ai-leadership/">National Science Foundation</a> and the <a href="https://www.capitalone.com/tech/ai/partnership-ai/">Partnership on AI</a>.</p><h3>Day 2: The Frontier Forum</h3><p>The second day focused on the enterprise, exploring how scientific breakthroughs can scale to create real business impact. Highlights included:</p><p><strong>Economics of AI:</strong> Insights from Professor Jason Furman of the Harvard Kennedy School of Government focused on the emerging macroeconomic impacts of advanced AI.</p><p><strong>Innovations in Infrastructure:</strong> Bryan Catanzaro of NVIDIA and Professor Randall Balestriero of Brown University and formerly Meta AI Research offered deep dives into open foundation models and accelerated infrastructure, and the applicability of world models to reliable AI in complex real-world parameters, respectively.</p><p><strong>Agentic Coding:</strong> Boris Cherny and Laurens van der Maaten from Anthropic explored the future of software engineering and research through the lens of Claude Code.</p><p><strong>Startup Showcases:</strong> Demos from Capital One Ventures startup partners highlighted the cutting edge of AI monitoring, data infrastructure and conversational applications.</p><p>Dialogues and connections facilitated by the Capital One AI Symposium are critically important drivers as we look to the next frontier of enterprise AI. By bringing together the brightest minds across academia, government, big tech, startups and our own enterprise, we are collaboratively building a more intelligent, autonomous and well-managed future.</p><p>We look forward to continuing these vital conversations and further fostering a collaborative ecosystem that attracts world-class talent to the frontier of AI and advances U.S. AI leadership.</p><p><em>Interested in joining the team that’s building the future of AI in finance? Explore our</em><a href="https://www.google.com/search?q=https://www.capitalone.com/tech/careers/"><em> AI Careers</em></a><em> page.</em></p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/ai/2026-capital-one-ai-symposium/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>DISCLOSURE STATEMENT:</em></strong><em> © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8b3f62471704" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/insights-from-the-inaugural-capital-one-ai-symposium-8b3f62471704">Insights from the inaugural Capital One AI Symposium</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[NLP research foundations at ICLR 2026]]></title>
            <link>https://medium.com/capital-one-tech/nlp-research-foundations-at-iclr-2026-94b81b8407e2?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/94b81b8407e2</guid>
            <category><![CDATA[ai-research]]></category>
            <category><![CDATA[agentic-ai]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Tue, 21 Apr 2026 16:55:24 GMT</pubDate>
            <atom:updated>2026-04-21T16:55:25.428Z</atom:updated>
            <content:encoded><![CDATA[<h4>Explore our latest research in LLM alignment, uncertainty quantification and privacy-preserving synthetic data in Rio de Janeiro.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3ZumM9yTSqmiO-iEqssJnw.png" /></figure><p>Capital One technologists are excited to participate in the 14th <a href="https://iclr.cc/">International Conference on Learning Representations</a> (ICLR) taking place in Rio de Janeiro, Brazil, April 23–27, 2026. As a premier venue for deep-learning research, ICLR provides a vital forum for addressing the complexities of natural language and representation learning.</p><p>Capital One is participating as a gold sponsor and research contributor to discuss advancements in large language model (LLM) alignment, uncertainty quantification and the development of responsible, agentic systems. This work provides the foundational technical solutions necessary for the next generation of financial services.</p><h3>Main conference research: AI safety and model reasoning</h3><p>The following research, accepted to the ICLR Main Conference, examines the limits of how models reason, adhere to safety policies and quantify uncertainty. This section includes work from Capital One researchers, papers first-authored by 2025 <a href="https://www.capitalonecareers.com/upgrade-ai-work-with-the-applied-research-internship-students-tech">Applied Research Interns</a> and collaborative research with academic partners.</p><p><a href="https://arxiv.org/pdf/2602.21346"><strong>Alignment-Weighted DPO: A novel way to improve alignment in LLMs via reasoning</strong></a><br><em>Capital One Authors: Mengxuan Hu (ARIP 2025), Vivek Datla, Anoop Kumar, Alfy Samuel, Daben Liu</em></p><p>Despite advances in alignment techniques like Direct Preference Optimization (DPO), LLMs remain vulnerable to jailbreak attacks. Our research, grounded in causal intervention, reveals that this vulnerability stems from “shallow” alignment, a lack of deep reasoning when rejecting harmful prompts. To bridge this gap, we introduce Alignment-Weighted DPO, a reasoning-aware post-training technique that identifies problematic reasoning segments during response generation. By targeting these specific vulnerabilities, our method improves robustness against diverse jailbreak strategies while maintaining overall model utility.</p><p><a href="https://arxiv.org/abs/2510.02671"><strong>Uncertainty as Feature Gaps: Epistemic Uncertainty Quantification of LLMs in Contextual Question-Answering</strong></a><br><em>Capital One Authors: Yavuz Bakman (ARIP 2025), Zhiqi Huang, Chenyang Zhu, Anoop Kumar, Alfy Samuel, Daben Liu</em></p><p>Quantifying epistemic uncertainty is critical for real-world contextual quality assurance. This study proposes a theoretically grounded approach that interprets uncertainty as “feature gaps” in hidden representations relative to an ideal model. By extracting features like context reliance and honesty, we form a robust uncertainty score. Experiments show a 13-point prediction-rejection ratio improvement over state-of-the-art methods with negligible inference overhead.</p><p><a href="https://arxiv.org/abs/2509.02563"><strong>DynaGuard: A Dynamic Guardian Model With User-Defined Policies</strong></a><br><em>Capital One Authors: Melissa Kazemi Rad, Bayan Bruss</em></p><p>While standard guardian models are limited to predefined harm categories, this collaboration with the University of Maryland introduces DynaGuard, a suite of dynamic models that evaluate conversational agent responses in multiturn settings based on user-defined policies, as well as DynaBench, a synthetically generated dataset with dynamic rules covering various industries and multiturn user-agent interactions. DynaGuard provides rapid detection of custom violations and a chain-of-thought option to justify outputs. It surpasses state-of-the-art guardrail models in accuracy and is competitive with frontier reasoning models on free-form policy violations.</p><p><a href="https://arxiv.org/abs/2510.01146"><strong>mR3: Multilingual Rubric-Agnostic Reward Reasoning Models</strong></a><br><em>Capital One Author: Genta Winata</em></p><p>Evaluation using LLM judges often fails to generalize to non-English settings. This work introduced mR3, a multilingual reward reasoning model trained on 72 languages and developed in partnership with Stanford University. It achieves state-of-the-art performance on multilingual benchmarks while remaining significantly smaller than larger models, demonstrating an effective strategy for building high-quality multilingual reward models.</p><p><a href="https://arxiv.org/abs/2602.01435v1"><strong>BioTamperNet: Affinity-Guided State-Space Model Detecting Tampered Biomedical Images</strong></a><br><em>Capital One Author: Premkumar Natarajan</em></p><p>Subtle manipulations in biomedical images can compromise experimental validity. In partnership with the University of Southern California (USC), this research introduces BioTamperNet, which uses affinity-guided attention inspired by state space model approximations to detect duplicated regions. By integrating lightweight linear attention mechanisms, it identifies tampered regions and their source counterparts more accurately than competitive forensic baselines. This methodology may be applicable to financial services in the context of fraud detection and image verification.</p><p><a href="https://arxiv.org/abs/2406.00153"><strong>μLO: Compute-Efficient Meta-Generalization of Learned Optimizers</strong></a><br><em>Capital One Author: Charles-Etienne Joseph</em></p><p>Learned optimizers (LOs) often struggle to optimize unseen tasks. In collaboration with Mila, Samsung AI Lab, Concordia University, Sorbonne University and Université de Montréal, this research derived the maximal update parametrization (μP) for two LO architectures and proposed a meta-training recipe for μ-parametrized LOs (μLOs). This method substantially improves meta-generalization to wider, deeper and longer training horizons compared to standard parametrization.</p><h3>Workshop tracks: Privacy, synthetic data and forecasting</h3><p>Our workshop participation addresses the intersection of privacy, synthetic data and time-series forecasting. This includes work from our Applied Research Internship Program and our funded university-based Academic Centers of Excellence.</p><p><a href="https://arxiv.org/pdf/2604.15461"><strong>Evaluating LLM Simulators as Differentially Private Data Generators</strong></a><strong> (The 2nd Workshop on Advances in Financial AI)</strong><br><em>Capital One Authors: Nassima Bouzid, Dehao Yuan, Nam Nguyen, Mayana Wanderley Pereira</em></p><p>LLM-based simulators offer a path for generating complex synthetic data, but their ability to reproduce statistical distributions from DP-protected inputs remains a question. This study finds that while these simulators achieve promising utility, they exhibit significant distribution drift due to systematic LLM biases. Addressing these failure modes is essential before LLM-based methods can handle the rich user representations required for financial simulations.</p><p><a href="https://arxiv.org/abs/2604.14495"><strong>Decoupling Identity From Utility: Privacy-by-Design Frameworks for Financial Ecosystems</strong></a><strong> (The 2nd Workshop on Advances in Financial AI)</strong><br><em>Capital One Authors: Ifayoyinsola Ibikunle, Tyler Farnan, Senthil Kumar, Mayana Wanderley Pereira</em></p><p>This paper positions differentially private (DP) synthetic data as a robust framework for building responsible agentic systems in finance. We examine direct tabular synthesis and DP-seeded agent-based modeling, arguing that the latter is essential for autonomous finance. It provides a “safe gym” for training agents, enabling fairness auditing and robustness testing while adhering to rigorous formal privacy guarantees.</p><p><a href="https://arxiv.org/abs/2604.08400"><strong>Zero-Shot Multivariate Time Series Forecasting Using Tabular Prior Fitted Networks</strong></a><strong> (Time Series in the Age of Large Models [TSALM] Workshop)</strong><br><em>Capital One Authors: Mayuka Jayawardhana (ARIP 2025), Doron Bergman, Nihal Sharma, Nam Nguyen, Mohammadkazem Meidani</em></p><p>This research recasts the multivariate time series forecasting problem as a series of scalar regression problems. Doing so provides a twofold benefit: First, we can leverage tabular foundation models (which have been remarkably successful in tabular regression tasks) in a zero-shot fashion to serve as forecasters. Second, our reformulation allows for interchannel interaction, going beyond the current standard of decomposing the multivariate forecasting problem into independent univariate subproblems.</p><p><a href="https://arxiv.org/abs/2602.21218"><strong>EPSVec: Efficient and Private Synthetic Data Generation via Dataset Vectors</strong></a><strong> (Workshop on Navigating and Addressing Data Problems for Foundation Models [DATA-FM])</strong><br><em>Capital One Authors: Erin Babinsky, Alfy Samuel, Anoop Kumar</em></p><p>Developed through our <a href="https://sac.usc.edu/credif/">USC-Capital One Center for Responsible AI and Decision Making in Finance (CREDIF)</a> program, EPSVec is a lightweight DP synthetic data generation method. It steers LLM generation using dataset vectors — directions in activation space that capture the distributional gap between private data and public priors. EPSVec extracts and sanitizes steering vectors just once and then performs standard decoding. This method decouples the privacy budget from generation, enabling high-fidelity synthetic samples even in low-data regimes with reduced computational overhead.</p><p><a href="https://arxiv.org/html/2604.10827v1"><strong>Your Model Diversity, Not Method, Determines Reasoning Strategy</strong></a><strong> (Workshop on Logical Reasoning of Large Language Models)</strong><br><em>Capital One Authors: Moulik Choraria (ARIP 2025), Anirban Das, Supriyo Chakraborty, Berkcan Kapusuzoglu, Chiahsuan Lee, Kartik Balasubramaniam, Shixiong Zhang, Sambit Sahu</em></p><p>This study investigates how the allocation of compute budget between exploration (breadth) and refinement (depth) impacts LLM reasoning. We argue that the optimal allocation strategy depends on a model’s “diversity profile”-the spread of probability mass across solution approaches-and it must be characterized before any exploration strategy is adopted. We formalize it by decomposing the reasoning uncertainty and deriving conditions under which tree-style refinement outperforms parallel sampling.</p><h3>Connect with Capital One at ICLR 2026</h3><p>If you’re attending the conference in Rio de Janeiro, we invite you to visit our booth to engage with our researchers and authors.</p><ul><li><strong>Visit our booth:</strong> 408</li><li><strong>Explore our research:</strong> Dive deep into our latest <a href="https://www.capitalone.com/tech/ai/">advancements in AI</a> and machine learning.</li><li><strong>Discover career opportunities:</strong> Learn about exciting <a href="https://www.capitalonecareers.com/search-jobs/applied%20research/234/1?utm_source=tech-site&amp;utm_medium=CTA&amp;utm_campaign=tech-site">applied research career paths</a> at Capital One for researchers and engineers passionate about AI and join our world-class team.</li><li><strong>Learn about our student and grad internships:</strong> Put your knowledge and skills to work in our 10-week to two-year <a href="https://www.capitalonecareers.com/graduate-programs?utm_source=tech-site&amp;utm_medium=CTA&amp;utm_campaign=tech-site">graduate programs</a> innovating new products and creatively solving the problems that impact our customers and our business.</li><li><strong>Engage with our team:</strong> Meet our researchers and AI experts, explore how we’re <a href="https://www.capitalone.com/tech/ai/innovating-financial-services-through-customer-centered-ai/">shaping financial services with patented AI</a> and discuss what’s next for AI in finance.</li></ul><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/ai/capital-one-at-iclr-2026/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>DISCLOSURE STATEMENT: </em></strong><em>© 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=94b81b8407e2" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/nlp-research-foundations-at-iclr-2026-94b81b8407e2">NLP research foundations at ICLR 2026</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Zero trust revolution: Why legacy network security fails]]></title>
            <link>https://medium.com/capital-one-tech/zero-trust-revolution-why-legacy-network-security-fails-8e94adf69a65?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/8e94adf69a65</guid>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[network-security]]></category>
            <category><![CDATA[zero-trust]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Fri, 10 Apr 2026 17:02:30 GMT</pubDate>
            <atom:updated>2026-04-10T17:02:31.983Z</atom:updated>
            <content:encoded><![CDATA[<h4>The shifting landscape of digital threats demands a fundamental change in network security.</h4><p>In 2005, long before my time at Capital One, I was a Marine corporal in Iraq. I supported network communications for my squadron, and because of my role, I had to bunker down when attacks occurred. Not fight, just be on high alert and ready to fight if necessary.</p><p>When a mortar round or rocket crossed the perimeter and hit the base, I felt it. Often, I felt like a sitting duck. Yet, despite what was happening around me, I had to be ready to support comms for my unit. I had to ensure it was available and secured-or zeroized if all else failed. In those days, though, I only worried about the outside threat-the physical one pounding on my door.</p><h3>Why now? The evolution of cyber threats</h3><p>We’ve come a long way since the early days of Operation Iraqi Freedom. Do those types of threats still exist in the world? You bet they do. However, we now have sophisticated cyber threats to deal with too. We have ransomware, DDoS attacks, social engineering, phishing attacks, deepfakes and the list goes on for a solid mile. Depending on the attack, these can come from the outside or the inside.</p><p>There are numerous reasons why these threats exist, but many stem from rapid advancements in technology and a growing internet presence. DataReportal.com indicates that <a href="https://datareportal.com/reports/digital-2024-deep-dive-the-state-of-internet-adoption">5.35 billion people were using the internet in 2024</a>. This is great for many industries but scary when considering the blast radius of one infiltrated app that millions of people could use.</p><p>Recent data breaches, like the MOVEit data breach in 2023, show how alarmingly simple and wide-scaling an attack can become if executed from the right angle in today’s world. In this attack, hackers obtained access to the MOVEit file transfer software. Then, they leveraged a vulnerability to retrieve sensitive data from tens of millions of people across a multitude of companies. That data was further utilized to collect ransom money from execs at big companies. The impact of this breach is still being felt today.</p><h3>The traditional security struggle bus</h3><p>I’m a network security engineer, but I’ll say it: Traditional network security struggles against modern threats. Conventional models rely heavily on a solid perimeter but allow for ease of movement for inside personnel. This is often due to cost or to improve performance.</p><p>Despite these struggles, the number of attacks and the number of directions they can come from are staggering. It’s not enough to build an “outside” firewall, a DMZ and an “internal” firewall your users sit behind. Today, we obviously need a more adaptive and resilient security model.</p><h3>Say hello to zero trust network security</h3><p>I’m sure you’ve heard of it by now, but zero trust network security (ZTNS) is a different way of thinking. Instead of assuming trust within the network, ZTNS is founded on this principle: “Never trust, always verify.” Every access request, whether it originates from inside or outside the network, is subject to strict verification.</p><h4>The “Never trust, always verify” approach</h4><p>In ZTNS, trust is never implicit. Each user and device must continually prove their legitimacy through stringent checks. This is akin to the rigorous identification checks at a military checkpoint-no one gets through without proper clearance. Want in? Badge, business and clearance level, please!</p><h4>Key components of zero trust</h4><ol><li><strong>Identity-Based Access Controls: </strong>Only authenticated and authorized users can access resources.</li><li><strong>Microsegmentation:</strong> Slicing the network into smaller segments to contain potential breaches, much like setting up multiple secure zones within a base.</li><li><strong>Continuous Monitoring:</strong> Constant vigilance over network activity to detect and respond to threats in real time.</li><li><strong>Least Privilege Access:</strong> Users have the minimal access required, limiting potential damage if an account is compromised.</li></ol><h3>Benefits of zero trust</h3><ul><li><strong>Enhanced Security Posture:</strong> With zero trust, each access attempt faces scrutiny, making it harder for attackers to roam once inside.</li><li><strong>Protection Against Insider Threats:</strong> Zero trust limits even trusted insiders’ actions. Essentially, you have to be verified to do things.</li><li><strong>Improved Visibility and Control:</strong> Zero trust allows organizations to monitor network traffic closely, which helps detect anomalies.</li></ul><h3>Implementing zero trust</h3><p>Zero trust is not something you magically implement overnight. It demands a thorough review of your current infrastructure. It demands vulnerabilities be identified. Furthermore, it requires a network audit to pinpoint where current security mechanisms fall short.</p><h4>Best practices for implementation</h4><ul><li><strong>Identity Management:</strong> Use strict identity and access management protocols.</li><li><strong>Network Segmentation: </strong>Create secure zones within the network to contain potential threats.</li><li><strong>Encryption:</strong> You need this for your sensitive data-in transit and at rest.</li><li><strong>Multifactor Authentication (MFA):</strong> Require multiple forms of verification for critical resources.</li><li><strong>Continuous Monitoring:</strong> Use advanced monitoring tools to identify and respond to unusual activities in real time.</li></ul><h3>SASE and zero trust</h3><p>Secure access service edge (SASE) combines networking and security to support zero trust principles. It uses five key capabilities:</p><ul><li><strong>Software-defined wide area network (SD-WAN)</strong></li><li><strong>Secure web gateway (SWG)</strong></li><li><strong>Cloud access security broker (CASB)</strong></li><li><strong>Firewall as a service (FWaaS)</strong></li><li><strong>Zero trust network access (ZTNA)</strong></li></ul><p>There are many providers and solutions for these capabilities. Still, if we hone in on ZTNA, you may recognize common solutions like GlobalProtect by Palo Alto Networks, Zscaler Private Access (ZPA) and Cisco Secure Client (formerly AnyConnect). Do any of those sound familiar?</p><h3>Real-world examples</h3><p>In his book “Zero Trust Security Demystified,” L.D. Knowings points out several organizations that have successfully embraced zero trust. He mentions big companies like Accenture, Cloudflare and Akamai, a well-known CDN with a dynamic environment. Even Cisco is mentioned, which should be familiar to many folks in the network space. They use their own SASE architecture, in fact.</p><p>Companies that have adopted zero trust report better threat detection and faster incident response times, as every access request undergoes verification. Many of their cloud infrastructures are secured, their attack surface is reduced, and there is limited ability for malware or bad actors to move laterally on the inside. Not to mention, their data is protected, and they can respond faster to new threats.</p><h3>Challenges of zero trust</h3><p>Zero trust can be tricky to implement, not to mention resource-intensive-costs, complexity and user experience all play a role in that. To overcome these types of challenges, organizations should:</p><ul><li><strong>Plan Thoroughly:</strong> Hash out a comprehensive plan that involves all necessary stakeholders, business requirements, target state and so on.</li><li><strong>Invest Wisely:</strong> Draft an RFP for solutions that meet your requirements and target state. Invest in the tools and technology that best meet your organization’s needs.</li><li><strong>Educate Users:</strong> Ensure that everyone-senior leaders, internal engineers, app developers and definitely your end users-understands your new tech and protocols.</li></ul><p>Balancing security with user experience is vital for successful adoption. There are many vendors that offer SASE solutions, some all-in-one and some only pieces of the bigger zero trust puzzle. Over time, there will be more, but here are some well-known ones: Palo Alto Networks, Fortinet, Netskope and Cisco.</p><h3>The future of zero trust</h3><p>As cyber threats evolve, zero trust will remain crucial in cybersecurity. Dynamic <a href="https://www.capitalone.com/software/blog/cloud-migration-journey/">cloud environments</a>, like the one we have at Capital One, make this especially important. However, with tech like <a href="https://www.capitalone.com/tech/machine-learning/applied-ai-research/">AI and machine learning</a>, we’ll be able to enhance zero trust by enabling better threat detection and response. With these, we can sift through data faster, find suspicious patterns or anomalies and be more proactive in our security stance.</p><p>Let’s not forget about the role of IoT either. Tim Cook, the CEO of Apple, said: “The Internet of Things is creating a new world where everything is connected and can be controlled remotely.” This is exciting, yet scary when you consider how fast things can hop on the internet with minimal security provisions. Of course, zero trust can help secure IoT devices by requiring each device to be authenticated and monitored, minimizing the risk of IoT-based attacks.</p><h3>Conclusion</h3><p>If I learned anything from my beloved time in the Marines, it would stem from this mantra: <strong>“Improvise, adapt and overcome.”</strong> That “adapt” part is crucial for today’s digital environment. By moving beyond outdated models and embracing zero trust, organizations can adapt and ensure more robust defenses against cyber adversaries.</p><p>In the evolving landscape of cybersecurity, zero trust is the new standard, and it’s the path that companies in the modern world must begin to take. This is the path toward resilient, perhaps even antifragile, networks. Adapting and staying vigilant are essential, as complacency is not an option.</p><p>Zero trust. Over and out.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/cloud/zero-trust-revolution-networking/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>Authored by Jerry Bair, Lead Platform Engineer, Network Core Security. </em></strong><em>Jerry Bair is a network security engineer supporting customer enablement for Capital One Network Observability. He ventured into the field after getting out of the U.S. Marine Corps in 2006 and found his way to Capital One in 2013. When he’s not tech-ing out at Capital One, he challenges himself with Spartan races and DEKA events.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8e94adf69a65" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/zero-trust-revolution-why-legacy-network-security-fails-8e94adf69a65">Zero trust revolution: Why legacy network security fails</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Highlights from NVIDIA GTC AI Conference 2026]]></title>
            <link>https://medium.com/capital-one-tech/highlights-from-nvidia-gtc-ai-conference-2026-8ff03452d77d?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/8ff03452d77d</guid>
            <category><![CDATA[nvidia]]></category>
            <category><![CDATA[agentic-ai]]></category>
            <category><![CDATA[ai-research]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Thu, 09 Apr 2026 13:55:53 GMT</pubDate>
            <atom:updated>2026-04-24T15:47:38.490Z</atom:updated>
            <content:encoded><![CDATA[<h4>Showcasing the transformative power of agentic AI in real-time customer workflows.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2V3Rw7avD1PwIk84WnAJQA.png" /></figure><p>Here’s a recap of Capital One’s presence at NVIDIA GTC 2026, which took place March 16–19 in San Jose, California. As always, GTC was a landmark event for the future of technology. As generative AI moves from experimental prototypes to enterprise-scale production, Capital One was excited to take part in the conversation.</p><p>With two featured sessions, a high-traffic booth presence, and strategic discussions with industry peers, our team shared how we are leveraging NVIDIA’s accelerated computing power to build a more enlightened banking experience.</p><p>This year, our leaders took the stage to discuss the shift from simple LLM chat interfaces to complex, <a href="https://www.capitalone.com/tech/ai/agentic-ai-the-next-frontier-in-generative-ai/">multi-agentic systems</a> capable of handling sophisticated conversational workflows.</p><h3>Featured sessions</h3><h4>Building Proprietary Multi-Agentic AI Workflows for Consumer Banking</h4><p>Explore how Capital One is leveraging its proprietary multi-agentic AI framework to improve the speed, effectiveness and documentation of customer service calls concerning fraud. This solution shows promise in enhancing both the human associate experience as well as the customer experience by advancing quality reviews and agent productivity while meeting rigorous business standards for accuracy, reliability and governance.</p><p>Featuring:</p><ul><li>Milind Naphade, SVP, Head of AI Foundations, Capital One</li><li>Ritesh Soni, MVP, Data Science, Retail Bank, Capital One</li></ul><p>Key Takeaways:</p><ul><li>Multi-Agent Orchestration: We demonstrated how combining customized foundation models with multi-agent orchestration reduces summarization latency while preserving critical details.</li><li>Customization and Scalability: The solution’s underlying multi-agentic framework was originally built to support a <a href="https://www.capitalone.com/tech/ai/future-of-ai-car-dealerships-shopping/">car-buying solution</a> and later applied to supporting customers with fraud resolution. This “build once, reuse extensively” mindset encourages associates from any corner of the bank to identify manual processes and pull from our centralized “tech stack” to build solutions.</li></ul><p><a href="https://www.nvidia.com/en-us/on-demand/session/gtc26-ex82362/">Watch the speaker session &gt;</a></p><h4>Accelerating Enterprise AI: From Infrastructure to Agentic Systems</h4><p>Our second session delved into the “five-layer cake” of AI-energy, chips, infrastructure, models and applications. Learn firsthand from Capital One engineering leaders how they’re building distributed data pipelines to curate high-quality datasets that enable laser-focused foundation models for financial applications.</p><p>Featuring:</p><ul><li>Brian Nguyen, Sr. Engineering Manager, Capital One</li><li>Nick Resnick, Lead AI Engineer, Capital One</li></ul><p><a href="https://www.nvidia.com/en-us/on-demand/session/gtc26-s81826/">Watch the speaker session &gt;</a></p><h3>Conversations on the floor and in the press</h3><p>Beyond the session halls, our booth received over 1,200 visitors and served as a hub for deep dives into MLOps, data privacy and the evolving landscape of open-source AI. Following the conference, the Wall Street Journal’s <em>CIO Journal</em> <a href="https://www.wsj.com/cio-journal/companies-say-the-risks-of-open-artificial-intelligence-models-are-worth-it-0d3ee664?mod=djemCIO">featured Capital One</a> in a discussion on why leading companies are leaning into open-source models despite the complexities.</p><h3>Looking ahead</h3><p>GTC 2026 made one thing clear: The era of agentic AI has arrived. For Capital One, this means moving beyond simple automation to create systems that can reason, collaborate and execute complex tasks on behalf of our customers and associates.</p><p>By combining NVIDIA’s cutting-edge hardware with our modern tech stack and data ecosystem as well as our deep domain expertise, we are continuing to define what’s possible in the next generation of financial services.</p><p>Interested in joining the team building the future of AI in finance? Explore our <a href="https://www.capitalonecareers.com/search-jobs/ai/234/1">AI Careers</a> page.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/ai/nvidia-gtc-2026/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8ff03452d77d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/highlights-from-nvidia-gtc-ai-conference-2026-8ff03452d77d">Highlights from NVIDIA GTC AI Conference 2026</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Secure random number generation on virtual hardware]]></title>
            <link>https://medium.com/capital-one-tech/secure-random-number-generation-on-virtual-hardware-ac4cd09fa548?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/ac4cd09fa548</guid>
            <category><![CDATA[cloud-services]]></category>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Mon, 06 Apr 2026 14:14:34 GMT</pubDate>
            <atom:updated>2026-04-09T13:49:16.187Z</atom:updated>
            <content:encoded><![CDATA[<h4>Explore how entropy sources, virtual hardware and cryptographic modules shape secure random number generation.</h4><p>The specter of generating a secure random number can unnerve a software engineer of any experience level. The apparitional subtleties of the myriad available approaches can tremble even the practiced hand of a seasoned cybersecurity professional. And as with the cryptographic domain’s other spindly fingers, secure random number generation demands precisely correct implementation-otherwise, the security of the entire system at question might collapse. But against the severe implications of a poor choice, a rudimentary understanding of where random numbers come from suffices to make an informed decision and effectively mitigate the security risk associated with an inadequate source of random numbers.</p><p>For engineers, cybersecurity professionals or anyone generating encryption keys or setting up a process to do so or governance around it, this article will demystify the process of selecting a random number generator by explaining the varying levels of security that different solutions can offer in different contexts.</p><h3>Understanding entropy and randomness</h3><p>Briefly, a few key terms will aid in understanding the nuances of random number generation.</p><h4>Random number generators</h4><p>The output of a function is called random-and similarly, the function can be called a true random number generator, or RNG-if given all inputs to the function there is no effective computational method to forecast its output. In other words, the output of the function does not follow any predetermined algorithm.</p><h4>Pseudorandom number generators</h4><p>A pseudorandom number generator (PRNG), on the other hand, is a function that, given a seed value, produces a sequence that passes statistical tests for randomness. PRNGs are different from RNGs because, given an identical seed and context, they will produce an identical sequence of numbers. However, they can suffice in many cases, provided an attacker has no means by which to discover the seed.</p><h4>Random bit generators and entropy</h4><p>The National Institute of Science and Technology (NIST) defines both of these concepts in computational terms. According to <a href="https://csrc.nist.gov/pubs/sp/800/90/a/r1/final">SP 800–90</a>, a random bit generator (RBG) is defined as “a device or algorithm that outputs a sequence of binary bits that appears to be statistically independent and unbiased.” As such, RBGs can be either RNGs or PRNGs. To distinguish between the two, NIST defines non-deterministic random bit generators and deterministic random bit generators (DRBGs) as their respective computational equivalents.</p><p>Entropy is a related concept that refers to the level of uncertainty in the output of a random function. NIST defines entropy as “a measure of the disorder, randomness or variability in a closed system.” Entropy is measured in bits-a fair coin flip has exactly one bit of entropy; an unfair coin flip has a little bit less entropy, since there is less uncertainty in the outcome; and a roll of a six-sided die has about 2.5 bits of entropy, since there is more uncertainty in the outcome. As the name implies, it is analogous to <a href="https://youtu.be/DxL2HoqLbyA?si=42PVm2rA65VUyGQL">entropy in the context of thermodynamics</a>. A source of entropy is an RBG acting as a source of uncertainty in the same way a coin or die might.</p><h3>Cryptographically secure language built-ins</h3><h4>How standard libraries generate random bits</h4><p>Desktop or server computers generate random bits by feeding output from a source of entropy through a DRBG. For example, computers might accumulate a pool of entropy consisting of things like mouse movements and temperature fluctuations from the central processing unit (CPU) <a href="https://www.intel.com/content/www/us/en/developer/articles/guide/intel-digital-random-number-generator-drng-software-implementation-guide.html">or specialty entropy-generation chips like Intel’s digital random number generator</a>. Upon user request, a DRBG siphons a few bits from the entropy pool and transforms them into a usable sequence of random bits.</p><h4>Why virtual environments add risk</h4><p>The cryptographically secure RBG from any language’s standard library uses this type of random bit generation-entropy collection from the hardware running it. Standard library RBGs are ubiquitously recommended by online forums, enterprise policies and government agencies, and they are secure in a wide range of cases. But when working in a virtualized setting, blindly following broadly scoped guidelines and collecting entropy from local hardware can leave your application vulnerable to attack.</p><h3>Problems with local entropy in virtualized infrastructure</h3><p>Virtualized infrastructure includes almost anything deployed using a cloud provider, but it could mean a fleet of dynamically provisioned virtual machines in a local data center or even on a single server. Of course, architects must examine each application individually to determine the level of risk each may pose, but two problems bedevil secure local entropy generation on most deployments of virtual hardware.</p><h4>Entropy starvation at boot time</h4><p>The first issue is a lack of entropy. Many large software deployments often involve dynamic scaling, which means frequent and automated provisioning of new servers or virtual machines. Soon after boot, an operating system <a href="https://lwn.net/Articles/889452/">may not have had enough time to collect sufficient entropy</a> to generate secure random bits. Operating systems work around this problem in a number of different ways, which means that a generation call may not actually generate a random bit sequence but instead a predictable vestige of a starved entropy source. For example, in some older, diskless Linux distributions, the kernel’s RBG <a href="https://eprint.iacr.org/2006/086.pdf">relies purely on reasonably predictable system events</a>, making the initial entropy state highly predictable.</p><h4>Entropy spying and manipulation on shared hardware</h4><p>The second issue pesters systems even more persistently and resists simple solutions. On virtualized hardware, any other user of a shared physical server can read or influence the entropy collected by that particular server. It has been <a href="https://pages.cs.wisc.edu/~rist/papers/paas-attacks.pdf">demonstrated in laboratory environments</a> that entropy spying and manipulation permit an attacker to effectively predict RBG output on virtual machine- and container-based deployments across cloud platforms and operating systems. In another case, as a common work-around of the problem of boot-time entropy starvation, many <a href="https://eprint.iacr.org/2006/086.pdf">Linux distributions save their final entropy state to the disk on shutdown as a seed to be loaded at reboot</a>. But after the operating system has been shut down, anyone with access to a shared physical disk might be able to read the seed data.</p><p>Entropy spying is an extreme danger for software on virtualized infrastructure. Any key generated on a device compromised this way is itself compromised; thus, generating secure random bits on virtual hardware requires a completely novel solution.</p><h3>A practical solution: Using hardware security modules</h3><h4>What HSMs are and why they’re secure</h4><p>Hardware-based RBGs are the best source of entropy available on a regular computer, but specialized hardware exists. In particular, for secure random bits when local entropy doesn’t suffice, choose a hardware security module (HSM).</p><p>HSMs are special-purpose servers that are primarily used for key management in security-sensitive sectors like government, health care and finance. Capital One uses HSMs to store our most secure keys. HSMs ship with purpose-built entropy generation hardware that is significantly more sophisticated than the entropy sources supplied with general-purpose consumer CPUs. These purpose-built chips are protected from any spying or meddling, generate enormous amounts of entropy, and are nearly impossible to compromise.</p><p>Unfortunately, HSMs are often expensive to buy and maintain, and access to HSMs both physically and over the network must be tightly restricted to keep the attack surface on these sensitive machines as small as possible. But as a work-around of the apparently prohibitive cost and security, major cloud platforms provide a way to get secure random bits from an HSM on demand without actually requiring that you purchase and maintain one yourself.</p><h4>Cloud KMS alternatives from AWS, Azure and GCP</h4><p>To generate high-quality random bits, AWS Key Management Service (KMS) provides a simple <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_GenerateRandom.html">GenerateRandom</a> application programming interface (API) call, Azure Key Vault has <a href="https://learn.microsoft.com/en-us/rest/api/keyvault/keys/get-random-bytes/get-random-bytes?view=rest-keyvault-keys-7.4&amp;tabs=HTTP">Get Random Bytes</a> and Google Cloud Platform (GCP) KMS offers <a href="https://cloud.google.com/kms/docs/generate-random">GenerateRandomBytes</a>. None of these API calls requires the creation or management of a dedicated HSM resource, and all three are billed at just $0.03 per 10,000 requests. Random bits generated using these functions are immune to the cloud vulnerabilities that haunt system RBGs.</p><h3>A perfect solution: Quantum random number generation</h3><p>For enterprises living on the cutting edge of security that wish to use in-house HSMs directly, some newer HSMs have begun <a href="https://www.thalestct.com/quantum-enhanced-keys/">incorporating exciting new quantum random number generator (QRNG) chips</a>. QRNG chips source their entropy from measurements of systems governed by the rules of quantum mechanics. Quantum random number generation, on the other hand, is protected by the universe itself-measurements of quantum systems are unpredictable as a law of physics. No attacker, even given perfect knowledge of a QRNG chip and all its inputs, can predict its output.</p><p>QRNG chips have limited availability today. Integration and cost challenges will likely prohibit on-prem adoption for a while, though cloud-based solutions through the providers of other key generation APIs may be available sooner. And because QRNGs are new, they remain under scrutiny for the side-channel and implementation-specific attacks that imperil all real-world cryptographic systems. But don’t despair if you can’t get access to one yet; modern DRBGs are good enough-so good that QRNGs don’t provide any practical advantages in terms of security (at least not any that are known to the public).</p><h3>Each application is unique: Matching entropy sources to risk</h3><p>Depending on the context, securing an application may only require a standard hardware-based entropy source or it may require a bleeding-edge QRNG chip. Since attacks on hardware-based entropy generation are possible, we must assume nation-state threat actors are executing them. So for the most security-sensitive random numbers, like AES or RSA keys protecting sensitive data, using random bits generated by a cloud provider’s HSMs is prudent. But for other applications, such a high level of caution may not be necessary.</p><p>Ultimately, each application needs an individual security review, and the source of any required random bits should be examined and evaluated as part of a comprehensive threat model. It is easy to find oneself caught in the Lethean maelstrom of online forums that immerse the topic of random number generation in verbiage that implies a mystery too deep to unravel. But-as with any other security decision-it is a set of practical and understandable criteria that determines the appropriate choice.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/cloud/secure-random-number-generation/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>Authored by William Cabell, Lead Software Engineer, Cyber Intelligence Engineering. </em></strong><em>I’m a lead software engineer and cybersecurity professional who finds fulfillment in solving hard, open-ended problems. I’ve built resilient engineering cultures and led the development of large-scale software platforms in the cryptography and cyber intelligence domains.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ac4cd09fa548" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/secure-random-number-generation-on-virtual-hardware-ac4cd09fa548">Secure random number generation on virtual hardware</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Capital One and UMD host agentic systems workshop]]></title>
            <link>https://medium.com/capital-one-tech/capital-one-and-umd-host-agentic-systems-workshop-01832e5a3b25?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/01832e5a3b25</guid>
            <category><![CDATA[ai-research]]></category>
            <category><![CDATA[agentic-ai-systems]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Fri, 03 Apr 2026 16:38:28 GMT</pubDate>
            <atom:updated>2026-04-03T16:38:29.720Z</atom:updated>
            <content:encoded><![CDATA[<h4>Capital One and UMD bring together researchers and industry leaders to explore agentic AI systems and real world applications.</h4><figure><img alt="Overhead shot of woman typing on laptop surrounded by notebooks and cup of tea" src="https://cdn-images-1.medium.com/max/1024/0*-BX8FpenpIRPbL0J.png" /></figure><p>Academic partnerships are an essential component of Capital One’s <a href="https://www.capitalone.com/tech/ai/ai-research-industry-academia/">approach to advancing AI research</a>. Our collaboration with the University of Maryland (UMD), initiated in 2017, showcases this commitment. Through support for computer science initiatives, faculty, student development and research, Capital One has engaged with UMD over the years to address challenges and opportunities in financial services.</p><h3>Fostering dialogue and collaboration</h3><p>On March 3, 2026, Capital One and UMD joined together to host the “Agentic Systems in Industry” workshop to facilitate dialogue on the biggest open problems in the AI space. The event featured a series of lightning talks followed by small-group discussions between UMD faculty and Capital One researchers.</p><p>A key theme that emerged from the discussion was the challenges that can arise with recommender systems, specifically value alignment. Avoiding unintended consequences may require scalable evaluations for highly complex tasks and an effort to address control theory issues in feedback loops. Across industries and use cases, explainability remains of critical importance.</p><p>Another theme centered on the challenges of summarizing large-scale datasets and integrating knowledge from disparate sources. Advancing synthetic data generation and high-fidelity data curation will require further research. Additionally, research must evaluate the applicability of new methods, such as tabular and graph foundation models, to large-scale datasets. These issues underscore the ongoing necessity of ensuring interpretability and comprehensible explanations.</p><p>“I thoroughly enjoyed interacting with the UMD academic community,” said Giri Iyengar, Vice President of Specialist Models at Capital One, who was in attendance. “The experience was invigorating, and the exchange of ideas was much needed for us to continue advancing the field.”</p><h3>Cultivating the next generation of AI practitioners</h3><p>Cultivating the next generation of AI talent is a critical pillar of successful campus-based research. The event included a poster session where Capital One researchers engaged with students on open research problems. The workshop concluded at the <a href="http://www.capitalone.com/tech/machine-learning/capital-one-unveils-new-technology-incubator-at-the-university-of-maryland-to-foster-ai-and-machine-learning/">Capital One Tech Incubator</a>, located in the UMD Discovery District, providing a final opportunity for community and connection among workshop attendees, university administrators and graduate students.</p><p>By working alongside institutions like UMD, Capital One can drive innovation through joint research and cultivate the next generation of AI practitioners. These strategic collaborations are crucial for unlocking AI’s full potential to transform financial services and deliver superior experiences for our customers.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/ai/agentic-ai-in-industry-workshop-at-umd/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=01832e5a3b25" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/capital-one-and-umd-host-agentic-systems-workshop-01832e5a3b25">Capital One and UMD host agentic systems workshop</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Capital One NLP Research at EACL 2026]]></title>
            <link>https://medium.com/capital-one-tech/capital-one-nlp-research-at-eacl-2026-01ed0bcafb9f?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/01ed0bcafb9f</guid>
            <category><![CDATA[ai-research]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[nlp]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Mon, 23 Mar 2026 14:20:39 GMT</pubDate>
            <atom:updated>2026-03-23T14:20:40.568Z</atom:updated>
            <content:encoded><![CDATA[<h4>See our latest advances in instruction compliance, fault attribution and RAG architecture at the leading European NLP conference.</h4><figure><img alt="Man and woman conversing at conference" src="https://cdn-images-1.medium.com/max/1024/0*_DzGsvEG2oCHfRDo.png" /></figure><p>Capital One technologists are excited to participate in the 19th Conference of the European Chapter of the Association for Computational Linguistics (<a href="https://2026.eacl.org/">EACL 2026</a>) taking place in Rabat, Morocco, on March 24–29, 2026. As a premier venue for computational linguistics, EACL provides a vital forum for sharing research that addresses the complexities of natural language.</p><p>Our technical presence at EACL 2026 — comprising five Main Conference papers and one Industry Track paper — is rooted in a clear research priority: building AI systems that remain stable and transparent when reasoning through complex, real-world logic. By focusing on instruction compliance, automated fault detection and Retrieval-Augmented Generation (RAG), this work provides the foundational technical solutions necessary for the <a href="https://www.capitalone.com/tech/ai/applied-ai-research/">next generation of financial services</a>. By participating in this conference, Capital One continues to contribute to global advancements in AI safety, system reliability and the creation of explainable AI architectures.</p><h3>Technical foundations: Advancing AI reliability and reasoning</h3><p>The following research examines the limits of how large language models (LLMs) adhere to complex constraints and identifies why agentic systems can sometimes falter over long horizons. This section includes work from Capital One researchers and first-authored papers from the 2025 <a href="https://www.capitalone.com/tech/academia/">Data Science Internship Program</a> (DSIP).</p><p><a href="https://www.capitalone.com/tech/publications/deconstructing-instruction-following/"><strong>Deconstructing Instruction-Following: A New Benchmark for Granular Analysis of Large Language Model Instruction Compliance Abilities</strong></a><br><em>Capital One Authors: Alberto Purpura, Li Wang, Sahil Badyal, Eugenio Beaufrand, Adam Faulkner</em></p><p>Reliably ensuring LLMs follow complex instructions is a significant challenge. Part of the problem is how we measure it, since benchmarks often conflate instruction compliance with general task success. This paper introduces a novel evaluation framework and a dynamically generated dataset with thousands of prompts, each containing up to 20 application-oriented constraints to enable granular analysis of the instruction-following abilities of LLMs. The research demonstrates that compliance varies significantly by constraint type and position, revealing specific model weaknesses like primacy and recency effects. These insights assist in developing LLMs for rigorous environments that require strict adherence to complex instructions.</p><p><a href="https://www.capitalone.com/tech/publications/raffles-reasoning-based-attribution-of-faults/"><strong>RAFFLES: Reasoning-based Attribution of Faults for LLM Systems</strong></a><br><em>Capital One Authors: Chenyang Zhu, Jingyu Wu, Kushal Chawla, Youbing Yin, Nathan Wolfe, Erin Babinsky, Daben Liu</em></p><p>Identifying the exact point of failure in multicomponent LLM agentic systems can be a persistent challenge. This paper presents RAFFLES, an evaluation architecture that uses iterative reasoning to automate fault detection. By utilizing a central “judge” to investigate faults and specialized “evaluators” to verify that reasoning, RAFFLES identifies failure points with significantly higher accuracy than existing baselines. This work offers a path toward enhancing human review with automated diagnostics for autonomous systems.</p><p><a href="https://www.capitalone.com/tech/publications/df-rag-enhancing-rag-for-question-answering/"><strong>DF-RAG: Enhancing RAG for Question Answering by Balancing Relevance and Diversity of Retrieved Chunks</strong></a><br><em>Capital One Authors: Saadat Hasan Khan (DSIP 2025), Jingyu Wu, Youbing Yin, Erin Babinsky, Daben Liu</em></p><p>Retrieval-augmented generation (RAG) performance is often limited by redundant information during the retrieval phase. This work, led by a 2025 Data Science Intern, introduces DF-RAG, a pipeline that dynamically balances retrieval diversity for each query at test time. Using a maximal marginal relevance (MMR)-based scoring mechanism and LLM-driven planning, DF-RAG recovered up to 90% of the gap between standard retrieval and the theoretical upper bounds for information recall in multi-hop benchmarks.</p><p><a href="https://www.capitalone.com/tech/publications/art-adaptive-reasoning-trees/"><strong>ART: Adaptive Reasoning Trees for Explainable Claim Verification</strong></a><br><em>Capital One Authors: Sahil Wadhwa, Himanshu Kumar, Guanqun Yang (DSIP 2025), Abbaas Alif Mohamed Nishar, Pranab Mohanty, Swapnil Shinde, Yue Wu</em></p><p>The opacity of LLM decision-making remains a barrier to adoption in select fields. This paper proposes ART (adaptive reasoning trees), a hierarchical method for claim verification. The process branches root claims into supporting and attacking arguments, which are adjudicated via a pairwise tournament by a judge LLM to derive a transparent, contestable verdict. ART’s structured reasoning consistently outperforms chain-of-thought (CoT) methods in explainable AI tasks.</p><h3>Scalable personalization: Profile-grounded synthetic data</h3><p>Bridging the gap between fundamental research and industry application is a priority for Capital One’s academic partnerships. This work was developed at the <a href="https://sac.usc.edu/credif/">USC-Capital One Center for Responsible AI and Decision Making in Finance (CREDIF)</a>, a joint research center that advances state-of-the-art research and foundations for algorithmic, data and software innovations in responsible AI and its applications to finance.</p><p><a href="https://www.capitalone.com/tech/publications/gravity-framework-for-personalized-text-generation/"><strong>GRAVITY: A Framework for Personalized Text Generation via Profile-Grounded Synthetic Preferences</strong></a><br><em>Capital One Authors: Wenqing Zheng and Daniel Barcklow</em></p><p>Personalization in LLMs typically requires manual human feedback. This paper introduces GRAVITY, a framework for generating synthetic, profile-grounded preference data. By integrating cultural and psychological frameworks (such as the Big Five OCEAN traits), GRAVITY synthesizes preference pairs to guide personalized content generation. In evaluations with 400 users, GRAVITY achieved higher preference gains than standard fine-tuning, providing a scalable path for personalization without relying on manual annotation.</p><h3>Applied engineering: Adaptable life cycles for generative AI</h3><p>Our participation in the Industry Track focuses on the practicalities of developing and maintaining AI systems at scale within complex operational environments.</p><p><a href="https://www.capitalone.com/tech/publications/an-approach-to-applied-dialogue-summarization/"><strong>Lessons from the Field: An Adaptable Lifecycle Approach to Applied Dialogue Summarization</strong></a><br><em>Capital One Authors: Kushal Chawla, Alfy Samuel, Shixiong Zhang, Ayushman Singh, Chenyang Zhu, Erin Babinsky, Jonah Lewis, Keasha Safewright, Pengshan Cai, Sambit Sahu, Sangwoo Cho, Scott Novotney</em></p><p>Summarizing multiparty dialogues is a critical industrial capability, yet static benchmarks rarely reflect the evolving requirements of real-world use. This industry case study shares insights from developing an agentic summarization system, covering evaluation methods for subjective tasks, component-wise optimization and the impact of upstream data bottlenecks. The work provides a road map for building summarization systems that remain adaptable to evolving business needs and technical constraints.</p><h3>Learn more about Capital One’s research at EACL 2026</h3><p>Researchers and authors are available throughout the conference to discuss these advancements and their application to the financial services landscape. To learn more about AI and machine learning at Capital One, visit our <a href="https://www.capitalonecareers.com/">careers page</a>.</p><p>We look forward to a fantastic EACL 2026 and an engaging conference in Rabat!</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/ai/capital-one-at-eacl-2026/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=01ed0bcafb9f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/capital-one-nlp-research-at-eacl-2026-01ed0bcafb9f">Capital One NLP Research at EACL 2026</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Meet Shehzad Mevawalla, EVP of Enterprise Data Tech]]></title>
            <link>https://medium.com/capital-one-tech/meet-shehzad-mevawalla-evp-of-enterprise-data-tech-fb8ed48688ab?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/fb8ed48688ab</guid>
            <category><![CDATA[enterprise-technology]]></category>
            <category><![CDATA[leadership]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Wed, 25 Feb 2026 19:08:46 GMT</pubDate>
            <atom:updated>2026-02-25T19:08:48.281Z</atom:updated>
            <content:encoded><![CDATA[<h4>An interview with Shehzad Mevawalla delving into his long-standing technology career and vision for data and AI at Capital One.</h4><figure><img alt="Shehzad Mevawalla headshot" src="https://cdn-images-1.medium.com/max/1024/0*B_uE9K0MLFFrjK3A.png" /></figure><p><em>This article captures a recent conversation with Shehzad Mevawalla, EVP, Head of Capital One’s Enterprise Data Technology organization. Shehzad joined Capital One in March 2025 with more than 36 years in data architecture, large-scale systems and </em><a href="https://www.capitalone.com/tech/ai/"><em>AI</em></a><em>, including roles at industry heavyweights Amazon, FICO and NCR/Teradata. Shehzad leads technology and engineering strategies for Enterprise Data, partnering closely with Capital One’s </em><a href="https://www.capitalone.com/tech/culture/amy-lenander-chief-data-officer-interview/"><em>Chief Data Officer</em></a><em> to continue to modernize and transform the company’s data ecosystem.</em> <em>We caught up with Shehzad as he approaches his one-year anniversary with the company to learn more about what attracted him to Capital One, his priorities for data technology and its role as a critical enabler for AI, and personal leadership philosophies that inform how he leads high-performing enterprise technology organizations.</em></p><h3>With a longstanding career in data and technology, what attracted you to this role at Capital One? How does it align with your professional goals and interests?</h3><p>As I researched Capital One’s culture and history, I realized that Capital One is really a technology company that also happens to be a bank. The founding principles of the company are based on leveraging deep analytics and technological advancement to deliver new, unique and personalized experiences for customers. What also stood out was Capital One’s relentless drive for reinvention. This isn’t a company satisfied with the status quo; it constantly seeks to evolve. That <a href="https://www.capitalone.com/tech/ai/innovating-financial-services-through-customer-centered-ai/">commitment to innovation</a>, coupled with a strong emphasis on employee well-being and development, made this role incredibly attractive.</p><p>During my long tenure at Amazon, I was extremely fortunate to work across a wide variety of areas with some amazing people. My experience there, particularly across large-scale data, risk management and machine learning, provided me with a highly relevant background. This deep alignment between my specific skills and experiences and the technical requirements and strategic vision of this role at Capital One was an excellent match. The connection was clear, and I’m genuinely thrilled to be here and to be contributing to Capital One’s continued success.</p><h3>What have been your top priorities in your first year with the team?</h3><p>Joining Capital One as the <a href="https://www.capitalone.com/tech/data/">head of Enterprise Data Technology</a> at such a pivotal time is incredibly exciting. The company has already made impressive strides in consolidating its operational and analytical data into a single, high-quality and well-managed data platform. This multi-year journey, spanning data collection, verification, publication, storage and usage, has been executed with remarkable care and insight.</p><p>My absolute first priority has been to connect with people, which includes building strong relationships with my teams, our partners across the organization and our customers. Concurrently, I’ve dedicated significant time to learning our <a href="https://www.capitalone.com/tech/software-engineering/enterprise-platform-strategy/">platforms and services</a>, and the underlying data itself-how it’s structured, managed and ultimately used to drive value. This dual focus on people and technology ensures our organization can lead effectively from an informed and collaborative position.</p><p>I’ve also been focused on examining everything we do through the lens of the customer. This includes identifying the many strengths of our current system so we can amplify and double down on those successes. Equally important is uncovering any gaps or points of friction that might hinder efficiency or lead to missed opportunities, then quickly addressing these areas to enhance our overall effectiveness.</p><p>Looking ahead, a high priority for me is to further increase the footprint of AI within our data systems. My goal is to make our data truly conversational, enabling more intuitive and powerful interactions for our users. This involves leveraging advanced AI techniques to unlock new insights, automate processes and create a more dynamic and accessible data environment for everyone.</p><h3>Over the course of your career, what has changed about the way companies use data and how they think about managing and leveraging data, especially to power their AI aspirations?</h3><p>The way companies use data has significantly evolved over time, especially with the rise of AI. As I think about it, three major changes have driven this evolution:</p><ol><li>The exponential growth in data scale. The shift from traditional databases to cloud-based technologies gives companies unlimited and cost-effective storage and compute capabilities.</li><li>The capability potential of unstructured data. Previously, unstructured data was largely inaccessible for decision-making without expensive processing. However, new models have made it queriable, allowing it to be incorporated into business decisions.</li><li>This combination of structured and unstructured data capabilities represents a revolutionary shift, opening new frontiers for data utilization and value creation that were previously unattainable.</li></ol><h3>You’re a software engineer by trade. Can you elaborate on how that training has manifested into the way you think about the systems, software and the developer experience today?</h3><p>My training as a software engineer is at the core of how I approach systems, software and the developer experience today. Leveraging both foundational technical thinking and deep understanding of the journey from concept to production allows me to make informed decisions and connect complex ideas, even when navigating new technological frontiers.</p><p>The developer experience is currently evolving as new models for code generation signal a fundamental shift in how systems are built. Although these tools are in their early stages, they promise to significantly enhance productivity and accelerate engineering throughput, helping to transform ingenuity into tangible products. Throughout this evolution, core development expertise and engineering proficiency will remain essential.</p><h3>Can you share your most important learnings from leading speech and audio technologies for Alexa?</h3><p>When I began my journey with Alexa, I was new to the highly specialized and technical field of speech science. To succeed, I had to quickly learn and adapt, embracing new frontiers through a mix of curiosity and confidence in my ability to master complex technical knowledge. The most significant milestone in this role was our work on moving from traditional machine learning to speech LLMs. In doing so, we delivered truly conversational and human-like interactions for Alexa and then further generalized it for other voice-based applications as well.</p><p>I’m excited that we’re now applying similar approaches to achieve natural-language interactions across the business at Capital One. This is especially true as some of the most exciting trends in data technology right now revolve around unstructured data and the increased accessibility of data use through AI. AI-powered data analytics tools are emerging that can generate datasets or answers to questions, which promise to revolutionize <a href="https://www.capitalone.com/tech/ai/data-management/">data management and utilization</a>. This is a key area of focus for us as we leverage the power of foundational LLMs to build AI into our work every day. In doing so, we’re continuing to amplify the huge value of data by making it easily accessible and usable through a natural and intuitive interface for both businesses and customers.</p><h3>Finally, are there any other notable career highlights and/or your passions outside of work you’d like to share?</h3><p>Professionally, every career change I’ve made has been to very different areas and has always been about expanding my own learning or expertise. At Amazon, for example, I took on roles in supply chain as well as speech, both of which are highly technical fields that had a steep learning curve for me. As you go through your career, keeping an eye on interesting areas you’d like to learn more about will enhance your overall understanding and personal development. At Capital One, I am learning all about the banking industry and how Capital One serves its customers. There’s no better way to do that than by understanding the data behind it, which gives you a really well-rounded view.</p><p>Personally, I have been a big car enthusiast since I was very young, and my love for cars has continued to this very day. I continue to spend my off-hours, when not with my children and family, enjoying this hobby.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/culture/shehzad-mevawalla-evp-enterprise-data-tech/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fb8ed48688ab" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/meet-shehzad-mevawalla-evp-of-enterprise-data-tech-fb8ed48688ab">Meet Shehzad Mevawalla, EVP of Enterprise Data Tech</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 12 takeaways from Droidcon NYC 2025]]></title>
            <link>https://medium.com/capital-one-tech/top-12-takeaways-from-droidcon-nyc-2025-96227bc38720?source=rss----3db3a67cb648---4</link>
            <guid isPermaLink="false">https://medium.com/p/96227bc38720</guid>
            <category><![CDATA[droidcon]]></category>
            <category><![CDATA[android-app-development]]></category>
            <category><![CDATA[software-engineering]]></category>
            <dc:creator><![CDATA[Capital One Tech]]></dc:creator>
            <pubDate>Fri, 09 Jan 2026 15:46:47 GMT</pubDate>
            <atom:updated>2026-01-09T15:46:46.128Z</atom:updated>
            <content:encoded><![CDATA[<h4>Discover key lessons from Droidcon NYC 2025 to improve Android apps with Jetpack Compose and Kotlin.</h4><p>Last June, we had the opportunity to attend Droidcon NYC. This is one of the premier conferences to learn about the cutting-edge tech in Android and how others from different companies are solving hard problems and delivering quality solutions. Last year was special since Capital One was a silver sponsor for the conference and we had 49 associates from all over the U.S. that attended.</p><p>Here are some top takeaways we took from the conference and wanted to share more broadly.</p><h3>1. Handling configuration changes in Jetpack Compose</h3><p>A key takeaway was managing configuration changes smoothly in Jetpack Compose. For frequent changes, like on foldables, you can opt out of full Activity recreation. First, add android:configChanges=&quot;orientation|screenSize|...&quot; to your AndroidManifest.xml. Then, in your Composables, use rememberSaveable to preserve simple UI state across these changes. This avoids the visual disruption of a full restart. For the standard Android behavior where the Activity is recreated, ViewModels remain the correct tool to hold and persist complex data.</p><figure><img alt="A risk chart for Android configuration qualifiers ranked from riskiest to extra safe. Riskiest includes locale and layoutDirection, while extra safe includes mcc and mnc." src="https://cdn-images-1.medium.com/max/1024/1*wF6ryVhsSoA9ChmrjukiPQ.png" /><figcaption>Safety ratings for handling configuration changes outside of Android Activity recreation</figcaption></figure><h3>2. AI in Android development: Smarter responses and documentation</h3><p>A great way to make AI give better responses is to link your team’s documentation to provide it with richer context. Likewise, <a href="https://www.capitalone.com/tech/ai/agentic-ai-the-next-frontier-in-generative-ai/">AI agents</a> can create a draft of your documentation for you (though make sure to review it). While agent use isn’t yet approved for use at Capital One, be on the lookout for when it gets approved, and continue using Gemini and Copilot in the meantime.</p><h3>3. The rise of server-driven UI in Android apps</h3><p>Server-Driven UI (SDUI) is great for quick design updates and A/B testing, as it lets you change the UI without needing a new app release, often leading to smaller native app sizes and faster load times with good network conditions. However, SDUI struggles with complex animations, map interactions and purely static screens because it introduces network dependency and can add significant backend complexity, potentially impacting performance on slower connections. It’s a powerful tool for dynamic content and rapid experimentation, but you need to carefully consider the trade-offs in terms of complexity and specific UI requirements.</p><h3>4. Coroutine exception handling to prevent app crashes</h3><p>By default, when a child coroutine fails, the exception propagates upwards, canceling its parent and all other sibling coroutines within that scope. To prevent an app crash from this unhandled exception, use a CoroutineExceptionHandler in the context of a top-level coroutine, like one launched from viewModelScope or rememberCoroutineScope(), because it stops exception propagation and avoids a program crash, preventing any leaks.</p><figure><img alt="Diagram comparing coroutine exception handling. Without an exception handler, Job B failure cancels the parent scope and crashes the app; with CoroutineExceptionHandler, the app does not crash even though the scope and sibling jobs are cancelled." src="https://cdn-images-1.medium.com/max/1024/1*gtp8hbuGcuYyuBZsJ8Tz5A.png" /></figure><h3>5. Understanding Compose rendering and UI tree management</h3><p>When @Composable functions are invoked, they contribute nodes to an in-memory tree that represents the UI. This helps track state and efficiently update changes.</p><h3>6. Using SubcomposeLayout for dynamic and adaptive UIs</h3><p>If you are making UI that isn’t fully known until runtime (ex: SDUI or loading an image that you don’t know the dimensions of), you can use SubcomposeLayout to first measure certain children, and then, based on those measurements, compose and measure other children. SubcomposeLayout is particularly useful for Server-Driven UIs and dynamically sizing elements based on their contents, allowing for flexible and adaptive layouts that wouldn’t otherwise be achievable with standard Compose layouts that follow a strict measure-then-layout-then-draw order.</p><h3>7. Coroutines vs. threads: Why Kotlin wins for concurrency</h3><p>The lightweight and non-blocking nature of coroutines allows for a graceful cancellation at different points of their execution, which makes management of concurrent tasks easy and efficient. Threads, on the other hand, are difficult to cancel gracefully since they often perform blocking I/O or computations without explicit “cancellation points,” meaning a cancellation request can go unnoticed while the thread is stuck waiting for an external event, potentially leaving shared resources in an inconsistent state and leading to deadlocks if it’s abruptly terminated mid-operation.</p><h3>8. Managing ExecutorService and lifecycle in Android</h3><p>It’s crucial to shut down an ExecutorService in Android because its threads won’t stop automatically, leading to memory leaks and battery drain. You must manually call shutdown() when the component using it, like a ViewModel, is destroyed. For modern apps, however, it’s far better to use Kotlin Coroutines with a CoroutineScope, as they handle this lifecycle management automatically and prevent leaks by design.</p><h3>9. Avoid breaking structured concurrency in coroutines</h3><p>A parent coroutine always waits for its children to complete. This means it is imperative that we use the correct scope and context because creating a new CoroutineScope starts an independent coroutine that is not a child of the original scope, thus breaking structured concurrency.</p><figure><img alt="Diagram comparing structured and broken coroutine concurrency. In structured concurrency, the parent scope waits for the child job to complete. In broken concurrency, an independent scope continues running after the parent ends, risking memory leaks." src="https://cdn-images-1.medium.com/max/1024/1*fGbDiaURX8egtmkquNij9Q.png" /></figure><h3>10. Building custom layouts in Jetpack Compose</h3><p>Custom layouts in Jetpack Compose give developers fine-grained control over measurement and placement, leading to better performance and more efficient UI rendering. They help avoid unnecessary recompositions by handling size and position logic in the measurement phase. This makes them especially valuable for complex or dynamic UIs where precision and optimization are critical.</p><h3>11. Exploring Kotlin multiplatform and cross-platform integration</h3><p>Even though we don’t currently use KMP, it enables us to share core business logic across Android, iOS and other platforms, reducing code duplication and ensuring consistency. This boosts developer efficiency, accelerates time-to-market and improves code quality through shared testing.</p><h3>12. Scaling real-world Android apps under pressure</h3><p>Scaling real-world apps under fire requires making tough architectural decisions quickly while maintaining app stability and user trust. It involves balancing short-term fixes with long-term scalability, often under high-pressure conditions like outages, rapid growth or organizational shifts.</p><h3>Looking back at Droidcon NYC 2025</h3><p>The most memorable part of Droidcon NYC 2025 wasn’t just the technical insights — it was connecting with so many Capital One associates and fellow Android developers from across the community. As a silver sponsor, Capital One was proud to support last year’s event and contribute to conversations shaping the future of Android development.</p><p><em>Originally published at </em><a href="https://www.capitalone.com/tech/software-engineering/droidcon-nyc-2025-takeaways/"><em>https://www.capitalone.com</em></a><em>.</em></p><p><strong><em>This blog was co-authored by Ariella Mendel, Software Engineer; Madona Wambua, Principal Software Engineer and Oleksandra Kurbanova, Software Engineer</em></strong></p><p><em>Ariella Mendel has been a Native Android Developer at Capital One for over three years, working on card fraud and disputes. With a graduate degree in Computer Engineering from Northwestern, she is passionate about applying hardware knowledge to improve the performance and scalability of Android applications. Outside of work, she enjoys running, hot yoga and gardening. Madona Wambua is a Principal Software Engineer with over a decade of experience in software development. She currently contributes her expertise at Capital One working on the mobile app, where she has been a key team member for the past eight months. Recognized as a Google Developer Expert in Android and a Women Techmakers Ambassador, Madona is deeply committed to advancing the tech community. She is also the author of the Modern Android 13 Development Cookbook, a comprehensive guide offering over 70 practical recipes for modern Android development using Kotlin and Jetpack Compose. Beyond her engineering role, Madona is pursuing an EMBA at Cornell University, reflecting her dedication to continuous learning and leadership. Oleksandra Kurbanova is an Android Software Engineer at Capital One with prior experience in data engineering and full-stack development.</em></p><p><em>DISCLOSURE STATEMENT: © 2026 Capital One. Opinions are those of the individual author and are not necessarily those of Capital One. Unless noted otherwise, Capital One is not affiliated with, nor endorsed by, any third parties mentioned and is not responsible for the content or privacy policies of any linked third-party sites. Any trademarks and other intellectual property used or displayed are property of their respective owners.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=96227bc38720" width="1" height="1" alt=""><hr><p><a href="https://medium.com/capital-one-tech/top-12-takeaways-from-droidcon-nyc-2025-96227bc38720">Top 12 takeaways from Droidcon NYC 2025</a> was originally published in <a href="https://medium.com/capital-one-tech">Capital One Tech</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>