Big Privacy / Cyber Security / De-Identification

How dApps Promote Minimal Loss in Downturn with Diversified Investments

Tagged , , Leave a Comment on How dApps Promote Minimal Loss in Downturn with Diversified Investments

The approach toward investing in cryptocurrencies and other blockchain projects depends on who does it, why, when and how. Investment portfolios of average consumers (this category potentially includes anyone who thinks about […]

READ MORE

Implementing De-identification V: From Planning to Action to Automation

De-Identification / Transformation / Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather a process […]

READ MORE

Implementing De-identification IV: How to Choose De-identification Software

De-Identification / Transformation / Transigram

Implementing De-identification IV: How to Choose De-identification Software

Tagged , ,

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the capacity to […]

READ MORE

Implementing De-identification III: Designing De-identification Business Architecture

De-Identification / Open Data / Transformation

Implementing De-identification III: Designing De-identification Business Architecture

Tagged ,

De-identification business architecture aims to ensure that de-identification is used with clear purposes and rules, integrates smoothly into your organization’s business process, and is genuinely useful to clients. The first two posts […]

READ MORE

Implementing De-identification II: How Mature Is Your De-identification Practice?

De-Identification / Transformation

Implementing De-identification II: How Mature Is Your De-identification Practice?

Last week, we discussed defining use cases as a first step towards implementing de-identification effectively. The next step is to assess your existing de-identification practices and develop a plan to improve them. […]

READ MORE

Implementing De-identification I: Who Gets What Kind of Data?

De-Identification / Transformation / Transigram

Implementing De-identification I: Who Gets What Kind of Data?

In our first article of our Implementing De-identification series, we discuss how to define use cases as a means to establish who will be receiving de-identified data and what types of data […]

READ MORE

News

Why Our Fast-Changing World Requires Us to Change Collaboration

The world around us is changing faster than ever before. It is changing politically (Brexit), socially (generation Z hitting the labour market), technologically (AI, quantum computing, blockchain and IoT coming our way), […]

READ MORE

News

Digital Supply Chain: Connecting the Dots of Design to Operate SCM Processes

The supply chain of today is governed by the manufacturer, wholesaler, retailer, and businesses operating in between. Not only has the concept of a supply chain progressed by leaps and bounds during […]

READ MORE

News

Artificial Intelligence: Why it’s Evolving Faster than Ever

In the 1950s and 1960, experts predicted that artificial intelligence would grant computers human-like capabilities in the 20th century. In reality, AI’s growth veered in a direction that didn’t resemble human-like thinking, […]

READ MORE

News

Why Cleaner Marketing Data is Essential for IT

In a world where B2B companies clash over who gets to be on top in terms of sales, numbers play a pretty big part. More so because variables such as conversion rates […]

READ MORE

%d bloggers like this: