Implementing De-identification IV: How to Choose De-identification Software

De-Identification / Transformation / Transigram

Implementing De-identification IV: How to Choose De-identification Software

Tagged , ,

Whether you decide to perform de-identification internally or procure a service provider, it is important that the technology to be used fits your organization’s needs and goals, and has the capacity to […]

READ MORE

News

Why Our Fast-Changing World Requires Us to Change Collaboration

The world around us is changing faster than ever before. It is changing politically (Brexit), socially (generation Z hitting the labour market), technologically (AI, quantum computing, blockchain and IoT coming our way), […]

READ MORE

News

Digital Supply Chain: Connecting the Dots of Design to Operate SCM Processes

The supply chain of today is governed by the manufacturer, wholesaler, retailer, and businesses operating in between. Not only has the concept of a supply chain progressed by leaps and bounds during […]

READ MORE

News

Artificial Intelligence: Why it’s Evolving Faster than Ever

In the 1950s and 1960, experts predicted that artificial intelligence would grant computers human-like capabilities in the 20th century. In reality, AI’s growth veered in a direction that didn’t resemble human-like thinking, […]

READ MORE

News

Why Cleaner Marketing Data is Essential for IT

In a world where B2B companies clash over who gets to be on top in terms of sales, numbers play a pretty big part. More so because variables such as conversion rates […]

READ MORE

%d bloggers like this: