Secure k-Anonymization over Encrypted DatabasesNowadays, applications interact with a plethora of potentially sensitive information from multiple sources. Data protection algorithms are…Aug 11, 2021Aug 11, 2021
Sanitise your System Dumps !Enterprises capture a vast amount of data about their customers and business processes. This data provides a competitive advantage to…Jul 30, 2021Jul 30, 2021
Data Readiness ReportData exploration and quality analysis is an essential yet tedious process in the AI pipeline. The journey of data from its collection to…Jul 14, 2021Jul 14, 2021