Diana Carolina Duque MontoyainDataReplyProtecting Sensitive Data with CDC in DatabricksDatabricks is becoming the preferred choice for all kinds of companies that are interested in exploiting their big data reserves for…May 15
Melanie BuechlerinELCA ITThe Ongoing Quest: Addressing Open Issues in Pseudonymization within Federated Learning FrameworksWhile the combination of federated learning and pseudonymization offers great benefits, it introduces new challengesDec 21, 2023Dec 21, 2023
Hayden SutherlandDfT MaaS Code of Practice : Recommendation 19/68Topic: Data considerations to facilitate MaaSOct 16, 2023Oct 16, 2023
Diana Carolina Duque MontoyainDataReplyProtecting Sensitive Data with CDC in DatabricksDatabricks is becoming the preferred choice for all kinds of companies that are interested in exploiting their big data reserves for…May 15
Melanie BuechlerinELCA ITThe Ongoing Quest: Addressing Open Issues in Pseudonymization within Federated Learning FrameworksWhile the combination of federated learning and pseudonymization offers great benefits, it introduces new challengesDec 21, 2023
Hayden SutherlandDfT MaaS Code of Practice : Recommendation 19/68Topic: Data considerations to facilitate MaaSOct 16, 2023
Luca ZavarellainWandering in Advanced AnalyticsPresentation of Chapter 6 from my book “Extending Power BI with Python and R”In this blog post I’ll cover the contents of Chapter 6, Anonymizing and Pseudonymizing your Data in Power BI.Oct 18, 2021
Satpal SohalSecuring and Scaling Data Products in the Data MeshIn the past twenty years, we’ve witnessed the emergence of numerous trailblazing platforms that have captivated IT professionals with…Oct 18, 2023
Allison ChavezData Anonymization MethodsData Anonymization itself can be seen as an umbrella term that encompasses various anonymization techniques. Context is the best way to…Jun 1, 2021