-

The Complexities of Building Your Own Name Matching System
Here are some pitfalls to consider if you are weighing whether to build your own Name Matching system
-

What is Cross-Language Name Matching?
Name Matching is an even more complex problem when it involves multiple writing systems
-

How to Choose a Fuzzy Name Matching Product
Before selecting a name matching product, here are 9 questions you may want to consider.
-

How Name Matching Makes It Easier to Find your Ancestors
In a fast-growing global ancestry industry and with the volume of digitized historical records increasing rapidly, returning better search results…
-

Entity Extraction Facilitates Compliance with DSAR and GDPR
GDPR mandates that individuals have the right to request access to any of their PII collected by an organization. One…
-

How Entity Extraction along with Fuzzy Name Matching Enable Attorneys to Select the Best Expert Witnesses
Expert witnesses are a critical part of a trial strategy. Selecting the best ones requires extensive evaluation of an expert…
-

How the Combination of Entity Extraction and Name Matching is Critical for Up-To-Date KYC Data
KYC Data Providers face the challenge of how to ensure their data is comprehensive and up-to-date in an ever-changing world…
-

How Identity Resolution Supports a Single View of the Customer
The myriad of ways in which customers interact with a company and the discrepancies in customer records make the job…
-

Name Matching Helps Social Media Companies Verify User Identity
Whether to fight disinformation, avoid criminal liability, or reduce the number of fake accounts, social media platforms are under increasing…
-

Name Matching Makes Hotel Self Check-In Possible
As hotels look to improve efficiencies and customer satisfaction, automated self check-in will become standard. The problem is matching names…
-

Identity Resolution Facilitates Data Warehousing
For organizations that rely on data warehouses for decision making, data quality is key.
-

Entity Extraction Helps Guard Sensitive Data
In the age of cyber attacks, protecting sensitive information has never been more urgent










