pki (19)

Improving operating margins in the wind sector with monitoring consolidation

The wind sector has always had a challenging business model. Wind energy projects depend on high initial investments with fluctuating production and price levels. To mitigate financial risk, wind project developers secure fixed revenues through power...

Saahil Khan · 6 hours ago · 1

The power of AI to transform renewable energy operations

Multiplant sites with diverse energy assets operate systems that cross or muddy the traditional perimeter line, creating new security concerns to protect against potential cyber threats, extreme weather events, or natural disasters. Compliance with e...

Saahil Khan · 6 hours ago · 1

Why data governance matters

Data governance and regulatory compliance has always been included in risk assessments, especially in industries where there is sensitive data or products that need to meet certain safety specifications or where minimum health standards need to be me...

Saahil Khan · 6 hours ago · 1

Grid data sharing explained

With the increasing availability of data throughout the energy data lifecycle, we can create a more sustainable and cost-effective way of living. Grid data sharing is the key to unlocking this potential and transitioning to a clean energy economy wit...

Saahil Khan · 7 hours ago · 1

How to ensure secure data processing

Data virtualization is the core technology that allows for fully compliant and secure data processing across expansive, spread out networks. A virtual representation of data is combined and processed securely according to the existing business rules....

Saahil Khan · 7 hours ago · 1

The evolution of Web3 tokenization and asset rights management

The key technology behind secure and decentralized rights markets is tokenization, a process of representing real-world or digital assets on a blockchain as tokens. This revolutionary technology is changing the way we think about asset management and...

Saahil Khan · 7 hours ago · 1

NFT copyright and security: Safeguarding digital assets in the era of Web3

Numerous high-profile cases have highlighted the vulnerabilities surrounding NFT copyright content and the urgent need for robust and scalable security measures. For example, pirates gain unauthorized access to the original content and distribute it...

Saahil Khan · 7 hours ago · 1

Data orchestration

As more and more businesses undergo a digital transformation, the amount of data they can collect, store, and analyze is growing exponentially. Unfortunately, all this data is typically in different formats, sources, and locations. Without a sound...

Saahil Khan · 7 hours ago · 1

Trusted distributed computing enables secure collaboration

We’ve written before about the benefits of secure data collaboration, including increased profitability and innovation. We’ve also discussed the challenges and security vulnerabilities around data sharing. The task of safe data...

Saahil Khan · 7 hours ago · 1

What are X.509 certificates and how do they enable trust?

X.509 certificates are a standard format established by the International Telecommunications Union, a branch of the UN. The certificate recommendation defines the framework for PKI and privilege management infrastructure (PMI) and establishes th...

Saahil Khan · 7 hours ago · 1

Making compliant data sharing the norm

The solution to all of these issues, and many others, is the use of virtualized data platforms to handle data sharing. Data virtualization creates an interoperable data layer that draws together only the data needed for specific queries wherever it i...

Saahil Khan · 7 hours ago · 1

What is PKI? The PKI fundamentals

The underpinning concept of PKI, where one person encrypts a message knowing that the recipient has the secret key to decrypt it, has been in practice for thousands of years. Today, it’s most familiar use is probably online communications. To e...

Saahil Khan · 7 hours ago · 1

Incorporating consent management into your data governance

While only really a feature of data functions in recent years, consent management has become a major talking point around GDPR compliance and other general data protection regulations. It’s also become the public’s most visible interface...

Saahil Khan · 7 hours ago · 1

Five common data aggregation mistakes and how to fix them

A commonly known example of data aggregation is the Consumer Price Index (CPI) from the Department of Labor which aggregates price changes in a wide variety of goods and services to track the fluctuation of the cost of living in the U.S. Un...

Saahil Khan · 7 hours ago · 1

Best practices for data lifecycle management

Once data is created, it is sent to data storage, which may be on-premises, cloud-based, or a hybrid of the two. The storage may consist of a data lake, data warehouse, or data lakehouse approach, depending on the needs of the organization.  In...

Saahil Khan · 8 hours ago · 1

Trusted distributed computing enables secure collaboration

Most other organizations have to rely on trusted collaboration to open up exciting new business opportunities.  We’ve written before about the benefits of secure data collaboration, including increased profitability and innovation. We...

saksham sharma · 19 June 2023 · 1