SlideShare a Scribd company logo
Alain Rodriguez, Fraud Platform, Uber
Kelvin Chu, Hadoop Platform, Uber
Locality Sensitive
Hashing by Spark
June 08, 2016
Overlapping Routes
Finding similar trips in a city
The problem
Detect trips with a high degree of overlap
We are interested in detecting trips that have
various degrees of overlap.
• Large number of trips
• Noisy, inconsistent GPS data
• Not looking for exact matches
• Directionality is important
Input Data
Millions of trips scattered over time and space
GPS traces are represented as an ordered list
of (latitude,longitude,time) tuples.
• Coordinates are reals and have noise
• Traces can be dense or sparse, yet overlapping
• Large time and geographic search space
[
{
"latitude":25.7613453844,
"epoch":1446577692,
"longitude":-80.197244976
},
{
"latitude":25.7613489535,
"epoch":1446577693,
"longitude":-80.1972450862
},
…
]
Divides the world into consistently sized regions. Area segments can be had of different sizes
Google S2 Cells
Efficient geo hashing
Jaccard index
Set similarity coefficient
The Jaccard index can be used as
a measure of set similarity A = {a, b, c}, B = {b, c, d}, C = {c, d, e}
J(A, A) = 1.0
J(A, B) = 0.5
J(A, C) = 0.2
Sparse and dense traces should be matched Ensure points are at most X distance apart
Different devices generate varying data densities.
Two segments that start and end at the same
location should be detected as overlapping.
Densification ensures that continuous segments
are independently overlapping.
Heuristic
Densify sparse traces
A
A
B
B
A
A
B
B
Heuristic
Remove noise resulting from a
vehicle stopped at a light or a very
chatty device.
Remove contiguous duplicates
Discretize segments
Break down routes into equal size
area segments; this eliminates
route noise. Segment size
determines matching sensitivity.
Discretize route segments
Directionality matters Shingling captures directionality
Two overlapping trips with opposite directions
should not be matched.
Combining contiguous segments captures the
sequence of moves from one segment to
another.
Heuristic
Shingle contiguous area segments
1 2 3 4 5 6 7 8
A
A
B
B
1 2 3 4 5 6 7 8
1->2 2->3 3->4 4->5 5->6 6->7 7->8
A
A
B
B
2->1 3->2 4->3 5->4 6->5 7->6 8->7
Set overlap problem
Find traces that have the desired level of common shingles
1->2
2->3
3->4 4->5
5->6 6->7
7->8
8->9
9->10
N^2 takes forever
LSH to the rescue
● Sifting through a month’s worth of trips for a city
takes forever with the N^2 approach
● Locality-Sensitive Hashing allows us to find most
matches quickly. Spark provides the perfect engine.
Locality-Sensitive Hashing (LSH)
Quick Introduction
Problem - Near Neighbors Search
Set of Points P
Distance Function D
Query Point Q
Problem - Clustering
Set of Points P
Distance Function D
Curse of Dimensionality
1-Dimension e.g. single integer
Q: 7 Distance: 3
A Solution: Binary Tree e.g. Return 9, 4, 8, ...
2-Dimension e.g. GPS point
Q: (12.73, 61.45) Distance: 10
A Solution: Quadtree, R-tree, etc
Curse of Dimensionality
How about very high dimension?
1->2 2->3 3->4 4->5 5->6 6->7 7->8
Very hard problem
A trip often has thousands of shingles
->3k
Approximate Solution
Bucket1
T1
T2
h(T1
)
h(T2
)
D(T1
, T2
) is small
With high probability T1
and T2
are hashed into the same bucket.
Trip T1
& Trip T2
are similar
Approximate Solution
Bucket1T1
T2
h(T1
)
h(T2
)
D(T1
, T2
) is large
With high probability T1
and T2
are hashed into the different buckets.
Bucket2
Trip T1
& Trip T2
are not similar
Some distance functions have good companions of hash functions.
For Jaccard distance, it is MinHash function.
MinHash(S) = min { h(x) for all x in the set S }
h(x) is hash function such as (ax + b) % m where a & b are some good
constants and m is the number of hash bins
Example:
S = {26, 88, 109}
h(x) = (2x + 7) % 8
MinHash(S) = min {3, 7, 1} = 1
Distance Hash Function
Jaccard MinHash
Hamming i-th value of vector x
Cosine Sign of the dot product of x and a random vector
Some Other Examples
How to increase and control the probability?
It turns out the solution is very intuitive.
Use Multiple Hash
Bucket1T1
T2
h1
(T1
)
h1
(T2
)
Bucket2
Bucket3
T1
T2
h2
(T1
)
h2
(T2
)
Both h1
and h2
are MinHash, but with different
parameters (e.g. a & b)
Our Approach of LSH on Spark
Shuffle Keys
h1
range
T1
T2
h1
(T1
)
h1
(T2
)
h2
(T1
)
h2
(T2
)
● RDD[Trip]
● The hash values are shuffle keys
● h1
and h2
have non-overlapping key ranges
● groupByKey()
h2
range
other hash
Keys Range
Post Processing
Bucket1
T1
, T2
● If T1
and T2
are hashed into the same bucket,
it’s likely that they are similar.
● Compute the Jaccard distance.
Approach 2
h1
range
T1
T2
h1
(T1
)
h1
(T2
)
h2
(T1
)
h2
(T2
)
● Same pair of trips are matched in both h1
and
h2
buckets
● Use one more shuffle to dedup
● Network vs Distance Computation
h2
range
other hash
Keys Range
Approach 3
● Don’t send the actual trip vector in the LSH and Dedup shuffles
● Send only the trip ID
● After dedup, join back with the trip objects with one more shuffle
○ Then compute the Jaccard distance of each pair of matched trips.
● When the trip object is large, Approach 3 saves a lot of network usage.
How to Generate Thousands of Hash Functions
● Naive approach
○ Generate thousands tuples of (a, b, m)
● Cache friendly approach - CPU register/L1/L2
○ Generate only two hash functions
○ h1
(x) = (a1
x + b1
) % m1
○ h2
(x) = (a2
x + b2
) % m2
hi
(x) = h1
(x) + i * h2
(x) i from 1 to number of hash functions
Other Features
● Amplification
○ Improve the probabilities
○ Reduce computation, memory and network used in final post-processing
○ More hashing (usually insignificant compared to the cost in final post-processing)
● Near Neighbors Search
○ Used in information retrieval, instances based machine learning
Other Applications of LSH
● Search for top K similar items
○ Documents, images, time-series, etc
● Cluster similar documents
○ Similar news articles, mirror web pages, etc
● Products recommendation
○ Collaborative filtering
Future Work
● Migrate to Spark ML API
○ DataFrame as first class citizen
○ Integrate it into Spark
● Low latency inserts with Spark Streaming
○ Avoid re-hashing when new objects are streaming in
Thank you
Proprietary and confidential © 2016 Uber Technologies, Inc. All rights reserved. No part of this document may be
reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or
by any information storage or retrieval systems, without permission in writing from Uber. This document is intended
only for the use of the individual or entity to whom it is addressed and contains information that is privileged,
confidential or otherwise exempt from disclosure under applicable law. All recipients of this document are notified
that the information contained herein includes proprietary and confidential information of Uber, and recipient may not
make use of, disseminate, or in any way disclose this document or any of the enclosed information to any person
other than employees of addressee to the extent necessary for consultations with authorized personnel of Uber.

More Related Content

PDF
Large-Scale Text Processing Pipeline with Spark ML and GraphFrames: Spark Sum...
PPTX
Outlier analysis and anomaly detection
PPTX
Data Mining: clustering and analysis
PPTX
Introduction to ETL process
PPTX
Data Transformation – Standardization & Normalization PPM.pptx
PPTX
Quantum cryptography
PPTX
Quantum cryptography
PPTX
Big Data Analytics
Large-Scale Text Processing Pipeline with Spark ML and GraphFrames: Spark Sum...
Outlier analysis and anomaly detection
Data Mining: clustering and analysis
Introduction to ETL process
Data Transformation – Standardization & Normalization PPM.pptx
Quantum cryptography
Quantum cryptography
Big Data Analytics

What's hot (20)

PPTX
Quantum Cryptography
PPT
Quantum cryptography
PDF
Differential privacy and applications to location privacy
PDF
Spark SQL Tutorial | Spark Tutorial for Beginners | Apache Spark Training | E...
PDF
Cluster analysis
PPTX
Homomorphic Encryption Scheme.pptx
PPT
Data mining-primitives-languages-and-system-architectures2641
PDF
Class imbalance problem1
PPTX
PPTX
Text clustering
PPT
Data mining
PPTX
Data Mining: an Introduction
PDF
Information Retrieval Fundamentals - An introduction
ODP
Top mobile app development company - Mindinventory
PPT
Cryptography Fundamentals
PPT
3. mining frequent patterns
PDF
Transposition cipher
PPT
PPTX
Android Malware 2020 (CCCS-CIC-AndMal-2020)
Quantum Cryptography
Quantum cryptography
Differential privacy and applications to location privacy
Spark SQL Tutorial | Spark Tutorial for Beginners | Apache Spark Training | E...
Cluster analysis
Homomorphic Encryption Scheme.pptx
Data mining-primitives-languages-and-system-architectures2641
Class imbalance problem1
Text clustering
Data mining
Data Mining: an Introduction
Information Retrieval Fundamentals - An introduction
Top mobile app development company - Mindinventory
Cryptography Fundamentals
3. mining frequent patterns
Transposition cipher
Android Malware 2020 (CCCS-CIC-AndMal-2020)
Ad

Similar to Locality Sensitive Hashing By Spark (20)

PDF
Thorny Path to the Large Scale Graph Processing, Алексей Зиновьев (Тамтэк)
PDF
Thorny path to the Large-Scale Graph Processing (Highload++, 2014)
PDF
Magellen: Geospatial Analytics on Spark by Ram Sriharsha
PPTX
Magellan FOSS4G Talk, Boston 2017
PPTX
Spark summit europe 2015 magellan
PDF
Magellan-Spark as a Geospatial Analytics Engine by Ram Sriharsha
PDF
Target Holding - Big Dikes and Big Data
PDF
Gis capabilities on Big Data Systems
PDF
A Lightweight Infrastructure for Graph Analytics
PPTX
Using Graph Analysis and Fraud Detection in the Fintech Industry
PPTX
Using Graph Analysis and Fraud Detection in the Fintech Industry
PDF
Building graphs to discover information by David Martínez at Big Data Spain 2015
PDF
Big data distributed processing: Spark introduction
PDF
Azure Cosmos DB - Technical Deep Dive
PDF
Sparksummitny2016
PPTX
Follow the money with graphs
PPTX
Clustering - ACM 2013 02-25
PPT
MapReduceAlgorithms.ppt
PDF
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
PDF
Ai1.pdf
Thorny Path to the Large Scale Graph Processing, Алексей Зиновьев (Тамтэк)
Thorny path to the Large-Scale Graph Processing (Highload++, 2014)
Magellen: Geospatial Analytics on Spark by Ram Sriharsha
Magellan FOSS4G Talk, Boston 2017
Spark summit europe 2015 magellan
Magellan-Spark as a Geospatial Analytics Engine by Ram Sriharsha
Target Holding - Big Dikes and Big Data
Gis capabilities on Big Data Systems
A Lightweight Infrastructure for Graph Analytics
Using Graph Analysis and Fraud Detection in the Fintech Industry
Using Graph Analysis and Fraud Detection in the Fintech Industry
Building graphs to discover information by David Martínez at Big Data Spain 2015
Big data distributed processing: Spark introduction
Azure Cosmos DB - Technical Deep Dive
Sparksummitny2016
Follow the money with graphs
Clustering - ACM 2013 02-25
MapReduceAlgorithms.ppt
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Ai1.pdf
Ad

More from Spark Summit (20)

PDF
FPGA-Based Acceleration Architecture for Spark SQL Qi Xie and Quanfu Wang
PDF
VEGAS: The Missing Matplotlib for Scala/Apache Spark with DB Tsai and Roger M...
PDF
Apache Spark Structured Streaming Helps Smart Manufacturing with Xiaochang Wu
PDF
Improving Traffic Prediction Using Weather Data with Ramya Raghavendra
PDF
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
PDF
No More Cumbersomeness: Automatic Predictive Modeling on Apache Spark Marcin ...
PDF
Apache Spark and Tensorflow as a Service with Jim Dowling
PDF
Apache Spark and Tensorflow as a Service with Jim Dowling
PDF
MMLSpark: Lessons from Building a SparkML-Compatible Machine Learning Library...
PDF
Next CERN Accelerator Logging Service with Jakub Wozniak
PDF
Powering a Startup with Apache Spark with Kevin Kim
PDF
Improving Traffic Prediction Using Weather Datawith Ramya Raghavendra
PDF
Hiding Apache Spark Complexity for Fast Prototyping of Big Data Applications—...
PDF
How Nielsen Utilized Databricks for Large-Scale Research and Development with...
PDF
Spline: Apache Spark Lineage not Only for the Banking Industry with Marek Nov...
PDF
Goal Based Data Production with Sim Simeonov
PDF
Preventing Revenue Leakage and Monitoring Distributed Systems with Machine Le...
PDF
Getting Ready to Use Redis with Apache Spark with Dvir Volk
PDF
Deduplication and Author-Disambiguation of Streaming Records via Supervised M...
PDF
MatFast: In-Memory Distributed Matrix Computation Processing and Optimization...
FPGA-Based Acceleration Architecture for Spark SQL Qi Xie and Quanfu Wang
VEGAS: The Missing Matplotlib for Scala/Apache Spark with DB Tsai and Roger M...
Apache Spark Structured Streaming Helps Smart Manufacturing with Xiaochang Wu
Improving Traffic Prediction Using Weather Data with Ramya Raghavendra
A Tale of Two Graph Frameworks on Spark: GraphFrames and Tinkerpop OLAP Artem...
No More Cumbersomeness: Automatic Predictive Modeling on Apache Spark Marcin ...
Apache Spark and Tensorflow as a Service with Jim Dowling
Apache Spark and Tensorflow as a Service with Jim Dowling
MMLSpark: Lessons from Building a SparkML-Compatible Machine Learning Library...
Next CERN Accelerator Logging Service with Jakub Wozniak
Powering a Startup with Apache Spark with Kevin Kim
Improving Traffic Prediction Using Weather Datawith Ramya Raghavendra
Hiding Apache Spark Complexity for Fast Prototyping of Big Data Applications—...
How Nielsen Utilized Databricks for Large-Scale Research and Development with...
Spline: Apache Spark Lineage not Only for the Banking Industry with Marek Nov...
Goal Based Data Production with Sim Simeonov
Preventing Revenue Leakage and Monitoring Distributed Systems with Machine Le...
Getting Ready to Use Redis with Apache Spark with Dvir Volk
Deduplication and Author-Disambiguation of Streaming Records via Supervised M...
MatFast: In-Memory Distributed Matrix Computation Processing and Optimization...

Recently uploaded (20)

PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPT
Reliability_Chapter_ presentation 1221.5784
PDF
Foundation of Data Science unit number two notes
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Miokarditis (Inflamasi pada Otot Jantung)
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Reliability_Chapter_ presentation 1221.5784
Foundation of Data Science unit number two notes
IBA_Chapter_11_Slides_Final_Accessible.pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Introduction-to-Cloud-ComputingFinal.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Major-Components-ofNKJNNKNKNKNKronment.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
Moving the Public Sector (Government) to a Digital Adoption
Supervised vs unsupervised machine learning algorithms
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
climate analysis of Dhaka ,Banglades.pptx
Introduction to Knowledge Engineering Part 1
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx

Locality Sensitive Hashing By Spark

  • 1. Alain Rodriguez, Fraud Platform, Uber Kelvin Chu, Hadoop Platform, Uber Locality Sensitive Hashing by Spark June 08, 2016
  • 3. The problem Detect trips with a high degree of overlap We are interested in detecting trips that have various degrees of overlap. • Large number of trips • Noisy, inconsistent GPS data • Not looking for exact matches • Directionality is important
  • 4. Input Data Millions of trips scattered over time and space GPS traces are represented as an ordered list of (latitude,longitude,time) tuples. • Coordinates are reals and have noise • Traces can be dense or sparse, yet overlapping • Large time and geographic search space [ { "latitude":25.7613453844, "epoch":1446577692, "longitude":-80.197244976 }, { "latitude":25.7613489535, "epoch":1446577693, "longitude":-80.1972450862 }, … ]
  • 5. Divides the world into consistently sized regions. Area segments can be had of different sizes Google S2 Cells Efficient geo hashing
  • 6. Jaccard index Set similarity coefficient The Jaccard index can be used as a measure of set similarity A = {a, b, c}, B = {b, c, d}, C = {c, d, e} J(A, A) = 1.0 J(A, B) = 0.5 J(A, C) = 0.2
  • 7. Sparse and dense traces should be matched Ensure points are at most X distance apart Different devices generate varying data densities. Two segments that start and end at the same location should be detected as overlapping. Densification ensures that continuous segments are independently overlapping. Heuristic Densify sparse traces A A B B A A B B
  • 8. Heuristic Remove noise resulting from a vehicle stopped at a light or a very chatty device. Remove contiguous duplicates Discretize segments Break down routes into equal size area segments; this eliminates route noise. Segment size determines matching sensitivity. Discretize route segments
  • 9. Directionality matters Shingling captures directionality Two overlapping trips with opposite directions should not be matched. Combining contiguous segments captures the sequence of moves from one segment to another. Heuristic Shingle contiguous area segments 1 2 3 4 5 6 7 8 A A B B 1 2 3 4 5 6 7 8 1->2 2->3 3->4 4->5 5->6 6->7 7->8 A A B B 2->1 3->2 4->3 5->4 6->5 7->6 8->7
  • 10. Set overlap problem Find traces that have the desired level of common shingles 1->2 2->3 3->4 4->5 5->6 6->7 7->8 8->9 9->10
  • 11. N^2 takes forever LSH to the rescue ● Sifting through a month’s worth of trips for a city takes forever with the N^2 approach ● Locality-Sensitive Hashing allows us to find most matches quickly. Spark provides the perfect engine.
  • 13. Problem - Near Neighbors Search Set of Points P Distance Function D Query Point Q
  • 14. Problem - Clustering Set of Points P Distance Function D
  • 15. Curse of Dimensionality 1-Dimension e.g. single integer Q: 7 Distance: 3 A Solution: Binary Tree e.g. Return 9, 4, 8, ... 2-Dimension e.g. GPS point Q: (12.73, 61.45) Distance: 10 A Solution: Quadtree, R-tree, etc
  • 16. Curse of Dimensionality How about very high dimension? 1->2 2->3 3->4 4->5 5->6 6->7 7->8 Very hard problem A trip often has thousands of shingles ->3k
  • 17. Approximate Solution Bucket1 T1 T2 h(T1 ) h(T2 ) D(T1 , T2 ) is small With high probability T1 and T2 are hashed into the same bucket. Trip T1 & Trip T2 are similar
  • 18. Approximate Solution Bucket1T1 T2 h(T1 ) h(T2 ) D(T1 , T2 ) is large With high probability T1 and T2 are hashed into the different buckets. Bucket2 Trip T1 & Trip T2 are not similar
  • 19. Some distance functions have good companions of hash functions. For Jaccard distance, it is MinHash function.
  • 20. MinHash(S) = min { h(x) for all x in the set S } h(x) is hash function such as (ax + b) % m where a & b are some good constants and m is the number of hash bins Example: S = {26, 88, 109} h(x) = (2x + 7) % 8 MinHash(S) = min {3, 7, 1} = 1
  • 21. Distance Hash Function Jaccard MinHash Hamming i-th value of vector x Cosine Sign of the dot product of x and a random vector Some Other Examples
  • 22. How to increase and control the probability? It turns out the solution is very intuitive.
  • 23. Use Multiple Hash Bucket1T1 T2 h1 (T1 ) h1 (T2 ) Bucket2 Bucket3 T1 T2 h2 (T1 ) h2 (T2 ) Both h1 and h2 are MinHash, but with different parameters (e.g. a & b)
  • 24. Our Approach of LSH on Spark
  • 25. Shuffle Keys h1 range T1 T2 h1 (T1 ) h1 (T2 ) h2 (T1 ) h2 (T2 ) ● RDD[Trip] ● The hash values are shuffle keys ● h1 and h2 have non-overlapping key ranges ● groupByKey() h2 range other hash Keys Range
  • 26. Post Processing Bucket1 T1 , T2 ● If T1 and T2 are hashed into the same bucket, it’s likely that they are similar. ● Compute the Jaccard distance.
  • 27. Approach 2 h1 range T1 T2 h1 (T1 ) h1 (T2 ) h2 (T1 ) h2 (T2 ) ● Same pair of trips are matched in both h1 and h2 buckets ● Use one more shuffle to dedup ● Network vs Distance Computation h2 range other hash Keys Range
  • 28. Approach 3 ● Don’t send the actual trip vector in the LSH and Dedup shuffles ● Send only the trip ID ● After dedup, join back with the trip objects with one more shuffle ○ Then compute the Jaccard distance of each pair of matched trips. ● When the trip object is large, Approach 3 saves a lot of network usage.
  • 29. How to Generate Thousands of Hash Functions ● Naive approach ○ Generate thousands tuples of (a, b, m) ● Cache friendly approach - CPU register/L1/L2 ○ Generate only two hash functions ○ h1 (x) = (a1 x + b1 ) % m1 ○ h2 (x) = (a2 x + b2 ) % m2 hi (x) = h1 (x) + i * h2 (x) i from 1 to number of hash functions
  • 30. Other Features ● Amplification ○ Improve the probabilities ○ Reduce computation, memory and network used in final post-processing ○ More hashing (usually insignificant compared to the cost in final post-processing) ● Near Neighbors Search ○ Used in information retrieval, instances based machine learning
  • 31. Other Applications of LSH ● Search for top K similar items ○ Documents, images, time-series, etc ● Cluster similar documents ○ Similar news articles, mirror web pages, etc ● Products recommendation ○ Collaborative filtering
  • 32. Future Work ● Migrate to Spark ML API ○ DataFrame as first class citizen ○ Integrate it into Spark ● Low latency inserts with Spark Streaming ○ Avoid re-hashing when new objects are streaming in
  • 33. Thank you Proprietary and confidential © 2016 Uber Technologies, Inc. All rights reserved. No part of this document may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval systems, without permission in writing from Uber. This document is intended only for the use of the individual or entity to whom it is addressed and contains information that is privileged, confidential or otherwise exempt from disclosure under applicable law. All recipients of this document are notified that the information contained herein includes proprietary and confidential information of Uber, and recipient may not make use of, disseminate, or in any way disclose this document or any of the enclosed information to any person other than employees of addressee to the extent necessary for consultations with authorized personnel of Uber.