De-Identification / Transformation / Transigram

Implementing De-identification V: From Planning to Action to Automation

Assessing needs, setting maturity goals, designing business architecture, and choosing suitable technology sets the stage for rolling out new de-identification services smoothly. This is not a one-time event, but rather a process […]

READ MORE

De-Identification / Open Data / Transformation

Implementing De-identification III: Designing De-identification Business Architecture

Tagged ,

De-identification business architecture aims to ensure that de-identification is used with clear purposes and rules, integrates smoothly into your organization’s business process, and is genuinely useful to clients. The first two posts […]

READ MORE

De-Identification / Transformation

Implementing De-identification II: How Mature Is Your De-identification Practice?

Last week, we discussed defining use cases as a first step towards implementing de-identification effectively. The next step is to assess your existing de-identification practices and develop a plan to improve them. […]

READ MORE

News

Artificial Intelligence in Future and Present

One of the most cherished dreams — and fears — of today is penetration of Artificial Intelligence in all aspects of our life. Books and movies about wars with robots, artificial masterminds and the forever changed […]

READ MORE

News

Say a Word for Augmented Reality

When we think about the new and exciting world where the computer reality and the physical world are combined into a unique experience, we imagine ourselves on top of the world climbing […]

READ MORE

News

The 4 Big Data Positions to Fill to Create a Successful Analytics Team

For a few years now, big data has been one of the hottest types of business technology around. The high-visibility big data successes like Amazon, Facebook, and Netflix have sent everyone from […]

READ MORE

%d bloggers like this: