“Nova is a passionate professional in digitalisation areas, bringing good experience from telco and other industries. ”
Nova Upinel Altesse Chow
Salford, England, United Kingdom
1K followers
500+ connections
About
Adaptable and seasoned Technical Product Manager with over 12 years of hands-on…
Activity
-
Hiring a Senior PM on my team. Our "hardcore" culture is not for everyone. But if you are up to the challenge, come join us to increase the Freedom…
Hiring a Senior PM on my team. Our "hardcore" culture is not for everyone. But if you are up to the challenge, come join us to increase the Freedom…
Liked by Nova Upinel Altesse Chow
Experience
Education
Volunteer Experience
-
Lifetime Member
Lifetime Member
Mensa International
Licenses & Certifications
Publications
-
Integrating Cybersecurity Frameworks within Agile Product Management Cycles: A Guide to Best Practices and Key Considerations Across Legal, Backend, Frontend, and Log System Design
In an era of increasingly sophisticated cyber threats, the agility of product management cycles is crucial for maintaining robust cybersecurity postures. This thesis explores best practices for the seamless incorporation of cybersecurity frameworks within agile product management cycles. We delve into the intricacies of such integrations, covering key considerations such as legal compliance, backend and frontend design, and log system architecture. A comprehensive review of existing literature…
In an era of increasingly sophisticated cyber threats, the agility of product management cycles is crucial for maintaining robust cybersecurity postures. This thesis explores best practices for the seamless incorporation of cybersecurity frameworks within agile product management cycles. We delve into the intricacies of such integrations, covering key considerations such as legal compliance, backend and frontend design, and log system architecture. A comprehensive review of existing literature and various industry practices reveals that a proactive approach to cybersecurity—that anticipates future technological developments and regulatory landscapes— enhances product security and integrity. Recommendations emphasize the importance of predictive analysis, leveraging artificial intelligence and machine learning for real-time threat detection, and staying agile amidst regulatory evolutions. This work underscores the potential for predictive analytics to transform cybersecurity measures (Cavusoglu et al., 2008), and highlights the revolutionary impact of AI and ML on agile security practices (Buczak & Guven, 2016). Furthermore, it confronts the inevitability of regulatory changes, advocating for forward- looking strategies to adapt to technological advancements (Romanosky, 2016). In sum, our study provides a foundation for ongoing research and offers a strategic framework for organizations seeking to integrate cybersecurity more deeply within their agile product management processes.
-
CPython: Enhancing Python’s Performance and Versatility
This thesis paper presents an in-depth exploration of CPython, the default and most widely used implementation of the Python programming language, and positions it within the context of other high-performance languages. It examines the core attributes that contribute to CPython’s status as a preferred interpreter among developers, such as its readability, comprehensive standard library, and the extensive selection of third-party packages available for extending its functionality.
The…This thesis paper presents an in-depth exploration of CPython, the default and most widely used implementation of the Python programming language, and positions it within the context of other high-performance languages. It examines the core attributes that contribute to CPython’s status as a preferred interpreter among developers, such as its readability, comprehensive standard library, and the extensive selection of third-party packages available for extending its functionality.
The comparative study conducted within this work evaluates CPython’s performance in terms of execution speed, memory consumption, concurrency, and overall versatility against other high-performing languages, notably C, Java, and Go. While these languages may excel in raw computational speed and efficiency, CPython is recognized for its ease of use and rapid development capabilities, factors that often outweigh the raw performance considerations in software development.
Significantly, this work also addresses the areas where CPython encounters limitations. These include the Global Interpreter Lock (GIL) that affects multi-threaded performance and the way dynamic typing influences both execution speed and memory usage. Despite these challenges, the thesis contends that CPython remains a robust option for many programming tasks, bolstered by its vibrant, active community and the continuous improvements made through the Python Enhancement Proposals (PEPs). -
The Effects of GDPR: A Comparison between the Hong Kong Personal Data (Privacy) Ordinance and the EU General Data Protection Regulation
UoS Master of Laws Dissertation
General Data Protection Regulation provides a complete framework to the Data Privacy standard to the companies inside EU countries, while at the same time, GDPR also regulates all companies that serve and store information of EU related Data Objects.
Due to the fact that when the HK PDPO was drafted, reference was made to the relevant requirements under the OECD Privacy Guidelines 1980 and the EU Directive. In consequence, the PDPO and the GDPR share many common features. Given that the GDPR…General Data Protection Regulation provides a complete framework to the Data Privacy standard to the companies inside EU countries, while at the same time, GDPR also regulates all companies that serve and store information of EU related Data Objects.
Due to the fact that when the HK PDPO was drafted, reference was made to the relevant requirements under the OECD Privacy Guidelines 1980 and the EU Directive. In consequence, the PDPO and the GDPR share many common features. Given that the GDPR constitutes significant developments, if not changes, of data protection law from the EU Directive, the new regulatory framework includes several requirements that are not found under the PDPO.
This dissertation will examine the practical steps and actions Hong-Kong based companies (substantially internet startups companies) should pay attention to, especially how data controllers and data processors should be aware of during the data share, exchange and working with subprocessors... -
In light of the Article 101 and 102 in the Treaty on the Functioning of the European Union (TFEU), examine how competition law has regulated intellectual property rights
UoS Master of Laws Thesis
The Articles 101 and 102 of the Treaty on the Functioning of the European Union (TFEU) are the core of the EC Competition Law. Article 101 regulates the inter-companies’ agreement, while Article 102 addresses the abuse of the dominant position of the business market...
-
The Sanctity of contracts (pacta sunt servanda, a.k.a. the “Umbrella clauses”) priority in Bilateral Investment Treaties (BITs) and Investor-States Contracts (ISCs) changes in the surrounding economic conditions
UoS Master of Laws Thesis
Over the decade, the investor seeks ways to minimize theirs on investing in the states. The typical risks the foreign investors faced include change in the political scenario, change in the regulatory or legal framework, changes in the contracts made with the state political and social instability.
The Investor-State Contracts (ISCs) appear as a transnational commercial law and within the Public International Law (PIL), designed for cross-border investment protection considering the…Over the decade, the investor seeks ways to minimize theirs on investing in the states. The typical risks the foreign investors faced include change in the political scenario, change in the regulatory or legal framework, changes in the contracts made with the state political and social instability.
The Investor-State Contracts (ISCs) appear as a transnational commercial law and within the Public International Law (PIL), designed for cross-border investment protection considering the applicable law of the contract, dispute settlement, and jurisdiction. The contractual devices, such as the Choice-of-law clause, Arbitration clause, Production Sharing Agreements, Hardship Clause, Force majeure clause, Renegotiation clause and Stabilization clause, is meant to control the risks when the breach or unforeseeable disadvantage occurs unluckily. ISCs become one of the important ways for the commercial contract between Investor and State.
Where the ISCs often have some limitation on claiming the compensation for breach of state contracts in International Investment, the principle of sanctity of contracts (pacta sunt servanda) in Bilateral Investment Treaties (BITs) – A-State to State Treaties, become common protection to the investors. It is under lex mercatoria - an unwritten, implied principle from the merchant’s practice, which is neither capitalism nor socialism, and it is a means to some end, which is an important and well-established law principle in the modern-day transnational commercial law. Thus, even the beneficiaries of such transactions by different countries vary, but this does not hinder the development of international trade. With both the SGS v. Pakistan and SGS v. Philippines from ICSID arbitration case, consider different tribunals on purely contractual claims and treaty claims, which helps further develop the BITs and the transnational commercial law... -
A Critically analyse to “Corporate governance, Boards of directors responsibility, The shareholders, the auditors and to satisfy themselves that an appropriate governance structure is in place.” with the UK and International company laws
UoS Master of Laws Thesis
The modern UK corporation law originated in the Joint Stock Companies Act 1844, enacted by William Gladstone in his presidency of the Board of Trade. The Act creates the key principle that citizens should have the right to establish a company through relatively simple administrative procedures, and the Companies House is in charge of these procedures.
Before this, the Company's establishment could only be achieved through cumbersome procedures via private parliamentary bills or royal…The modern UK corporation law originated in the Joint Stock Companies Act 1844, enacted by William Gladstone in his presidency of the Board of Trade. The Act creates the key principle that citizens should have the right to establish a company through relatively simple administrative procedures, and the Companies House is in charge of these procedures.
Before this, the Company's establishment could only be achieved through cumbersome procedures via private parliamentary bills or royal charter. These two ways of setting up companies still exist but are rarely used today.
The power distribution of the shareholders and the Board of Directors seems to be an old topic. There are many well-established doctrines, writings, and principles developed for ages. However, it is still important to remind people that our discussions on company legislation are still far from over in the rapidly changing world...
Projects
-
AppGreen
-
AppGreen is a tool to help business owners build mobile catalog applications for iPad, iPhone or Android mobile devices without seeing a single line of code.
Other creatorsSee project -
Hang Seng Index System
-
Hang Seng Indexes calculates and manages the Hang Seng Family of Indexes. Starting in 1969 with the creation of the Hang Seng Index, now widely recognised as the barometer of the Hong Kong stock market, Hang Seng Indexes has been at the forefront of the market, developing numerous market measures to help investors make their investment decisions.
-
Baidu (HK) Limited
-
Baidu, as the leading search engine in China, offers many services, including a Chinese language search engine for websites, audio files, and images. Baidu offers 57 search and community services including Baidu Baike, an online collaboratively built encyclopedia, and a searchable keyword-based discussion forum.
Honors & Awards
-
Best Startup Awards
ICT Awards
-
The Second Runnerup Award, Shanghai - Hong Kong Hackathon 2012
Shanghai - Hong Kong Hackathon 2012
Languages
-
English
Full professional proficiency
-
Cantonese
Native or bilingual proficiency
-
Mandarin
Native or bilingual proficiency
-
Chinese
Native or bilingual proficiency
Organizations
-
MENSA International
Member
-
Institute of Electrical and Electronics Engineers (IEEE)
Member
-
Management Information System Association (MISA)
Fellow
-
Association for Computing Machinery (ACM)
Member
Recommendations received
-
LinkedIn User
3 people have recommended Nova Upinel Join now to view
More activity by Nova Upinel
US interest-rates remains unchanged
Shared by Nova Upinel Altesse Chow
Tech investing is extra fun when you get to back a living legend like Jim Keller #ChipGod #晶片之神 #Tenstorrent
Liked by Nova Upinel Altesse Chow
[Solution] Simplifying BU Graduates Certificate Verification on LinkedIn #BostonUniversity #BU #Solution Hello fellow BU alumni, If you’ve tried to…
Shared by Nova Upinel Altesse Chow
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More