Recent Posts
Architecture, Cloud, Technology
Use Spring Cloud Config to centralize your Spring applications
Introduction Spring Cloud Config is a feature provided by the Spring framework to maintain all the configurations of your …
Continue reading "Use Spring Cloud Config to centralize your Spring applications"
Cloud, Technology
AWS Security – Dealing with Exposed Access keys
Exposed AWS Access keys are one of the very common use-cases that you will find across many organizations.
Backend, Technology
Java 17: Here’s a juicy update on everything that’s new
With the recent release of the Java 17 LTS release, many new language features have been added to JDK. …
Continue reading "Java 17: Here’s a juicy update on everything that’s new"
Healthcare, Machine Learning and AI, Technology
Data Masking and Data Anonymization: The need for Healthcare Companies
In today’s data-driven business landscape, unlocking insights from data is critical for an enterprise’s success. To achieve this, the …
Continue reading "Data Masking and Data Anonymization: The need for Healthcare Companies"
Healthcare, Machine Learning and AI, Technology
3 top tools to De-Identify PHI in Healthcare Datasets
Under US law, Protected Health Information, or PHI refers to any information pertaining to health state, health care, and …
Continue reading "3 top tools to De-Identify PHI in Healthcare Datasets"
Healthcare, Machine Learning and AI, Technology
How Machine Learning could help design more customized Mental Healthcare Treatments
Mental illness is a kind of health condition that affects a person’s mind, emotions, or behavior (or all three). …