Blog
Blog
- Artificial Intelligence
- Coronavirus
- Data analytics in education
- Data Center
- Data storage and preservation
- Digitalization in education
- Ethical challenges of artificial intelligence
- Finland - a forerunner in AI
- Identification
- Leverage from AI
- Maximizing the value of data
- Meet CSC
- Research networks
- Responsibility
- Security
- Sensitive data
- Supercomputers
- Aino Ropponen
- Aleksi Kallio
- Anni Jakobsson
- Antti Laitinen
- Antti Pursula
- Antti Vasara
- Atte Sillanpää
- Francesca Morello
- Hanna-Mari Puuska
- Irina Kupiainen
- Jaakko Leinonen
- Jan Åström
- Jenni Hyppölä
- Jessica Parland-von Essen
- Josefine Nordling
- Juha Hulkkonen
- Jussi Enkovaara
- Jussi Heikonen
- Kaisa Kotomäki
- Kalle Happonen
- Kimmo Koski
- Klaus Lindberg
- Liza Seppälä
- Manne Miettinen
- Maria Lehtivaara
- Mariikka Kekäläinen
- Markus Koskela
- Mats Sjöberg
- Miia Lindell
- Mikael Johansson
- Mikael Linden
- Minna Ahokas
- Neea Karstén
- Olga Heino
- Pekka Järveläinen
- Pekka Manninen
- Pekka Uusitalo
- Peter Råback
- Päivi Rauste
- Riina Salmivalli
- Risto Laurikainen
- Satu Tuomikorpi
- Sebastian von Alfthan
- Shuang Luo
- Siiri Fuchs
- Suvi Pousi
- Tero Aalto
- Tommi Kutilainen
- Tommi Nyrönen
- Urpo Kaila
- Ville Virtanen
- Walter Rydman
- Yrjö Leino
Content with Viewpoints Security .
Towards digital identity wallets: with patience and through practical applications
Moving away from rigid digital identities towards solutions where the user can choose which attributes of their identity they want to share with whom seems to respond best to what is expected of electronic identity solutions nowadays. But how does this work, what does it mean and what’s CSC’s role in all this?
Read More »Introducing CSC's content retention policy in Services for Research and Education
The volume of digital data is ever-growing, also in research. The owner of the content needs to be aware of legislative issues, understand the meaning of good data management practices and make plans for the data lifecycle. GDPR also sets requirements on data. Personal data must always be managed and deleted according to published plans and consents.
Read More »Mistä tunnet sä ystävän?
Tietoturva nousee tyypillisesti otsikoihin, kun vahinko on jo tapahtunut. Silloin on helppo ottaa kantaa ja olla kriittinen. Tulevien tietoturvapoikkeamien järkevä torjunta taas on huomattavasti vaikeampaa.
Read More »