The electronic health card has arrived—and it’s causing quite a stir already. Patients are not entitled to an insurance certificate in paper form, even if […]Continue reading »
Articles in this category aim to connect tech-savvy experts and inform technical nonprofessionals in an understandable way.
Confidential computing describes the approach of not only encrypting data during storage and transmission, but also during processing. To this end, several major providers—including Google, […]Continue reading »