- Presentation
- Presentation
- Privacy in Practice with Smart Pseudonymization - Lessons from the Belgian Public Sector (3.3 MiB)
- Webinar - Privacy in Practice with Smart Pseudonymisation (4.2 MiB)
- An introduction to confidential computing (23.8 MiB)
- Webinar - An introduction to confidential computing (4.6 MiB)
- Webinar AI-augmented Development (3.4 MiB)
- Architecting Tomorrow: a Vision on Event-Driven Architecture (3.6 MiB)
- Devoxx 2023: Quantum computers Vs. Modern cryptography (4.2 MiB)
- Géocodage : quels outils pour quels besoins ? (3.4 MiB)
- Guest Lecture VUB 2023 - Quantum computing Vs. Modern cryptography (8.8 MiB)
- Fake it till you make it - an introduction to synthetic data (4.1 MiB)
- Webinar DEVOXX- Fake it till you make it: an introduction to synthetic data (3.5 MiB)
- PostGIS - Gérer des données géographiques dans PostgreSQL (3.6 MiB)
- Cybersec 2022 - Kwantumcomputers Vs. Cryptografie (4.9 MiB)
- GIS Analytics: quel potentiel pour les données géographiques ? (4.8 MiB)
- Webinar SAI - Natural Language Generation (4.0 MiB)
- Privacy-enhancing technologies voor de publieke sector (7.3 MiB)
- Natural Language Generation (3.5 MiB)
- Anonimisatie Vs. Pseudonimisatie (4.7 MiB)
- Reusable SHACL Constraint Components for Validating Geospatial Linked Data (1.0 MiB)
- Starten met NLP in het Nederlands (1.9 MiB)
- Knowledge graphs - Concept, mogelijkheden en aandachtspunten (3.0 MiB)
- API - the Smals story (4.0 MiB)
- Kwantumcomputers & cryptografie (5.9 MiB)
- Some Pitfalls of AI (4.0 MiB)
- Webscraping for Analytics (1.8 MiB)
- Advanced cryptography for privacy protection - Cases from the government field (2.8 MiB)
- Bescherming van persoonsgegevens met geavanceerde cryptografie (7.3 MiB)
- AI entre rêve et réalité - AI tussen droom en daad (2.6 MiB)
- Talk Infosecurity 2019: Pitfalls in AI (1.7 MiB)
- Talk Infosecurity 2019: Blockchain lessons from the government field (2.4 MiB)
- From Blockchain to Reality - Cases, ervaringen & lessons learned (7.2 MiB)
- Conversational interfaces en chatbots (5.9 MiB)
- Conversational_interfaces_en_chatbots (6.0 MiB)
- 7 Myths About Bitcoin @ Infosecurity 2018 (3.4 MiB)
- Fighting Fraud with Graph Databases (1.8 MiB)
- The Quantum-World (3.1 MiB)
- Graph & Network analytics (13.1 MiB)
- Linking Together Personal Data in the Era of Big Data & GDPR (2.7 MiB)
- Blockchain & Smart Contracts (7.3 MiB)
- Data Protection 2.0 (3.8 MiB)
- Privacy vs. Analytics (6.9 MiB)
- Data Visualization (8.3 MiB)
- Strong Mobile Authentication (6.3 MiB)
- Cloud Security Guidance (4.2 MiB)
- Social Media & eGovernment (7.3 MiB)
- Gevoelige Overheidsdata en de Cloud (9.0 MiB)
- Infosessie Application Platform as a Service (6.0 MiB)
- Streamlining Analytics (6.0 MiB)
- Email Address Reliability (4.1 MiB)
- Archivage des bases de données (6.5 MiB)
- Bring Your Own Device & Mobile Security - L’art de faire cohabiter des appareils personnels et professionnels en entreprise (4.5 MiB)
- Introduction à Cloud Encryption - Comment protéger la confidentialité des données hébergées dans le cloud (1.6 MiB)
- Security Information & Event Management (SIEM) - Privileged Account Management (PAM) (5.3 MiB)
- High Availability Concepts (3.2 MiB)
- Predictive analytics (3.7 MiB)
- NoSQL - Hype ou Innovation (3.1 MiB)
- Gestion des certificats digitaux et méthodes alternatives de chiffrement (1.8 MiB)
- Cloud computing - Concept vaporeux ou réelle innovation ? (1.8 MiB)
- Gestion intégrée des anomalies - Evaluer et améliorer la qualité des données (4.5 MiB)
- Mobiele Applicaties - update (1.5 MiB)
- Product Review
- Research reports
- Techno