Why

Data sovereignty

Data spaces

International standards

We

Become a member

Members

Donate

Board

Head Office

IDSA ambassadors

Contact

Make

Working groups

Task forces

Network

Open source

Projects

Communities

Offers

Reference Architecture

Dataspace Protocol

IDSA Rulebook

Certification

IDS Reference Testbed

Data Connector Report

Adopt

Data Spaces Radar

Implementation partners

Professional qualifications

Knowledge Base

Publications

Most important documents

Papers

Magazine

Legacy

Events

Upcoming events

Calendar

Archive

News

Blog

Newsroom

Infohub

Newsletter

Capgemini and IDSA: Fostering data sharing together

Capgemini and IDSA: Fostering data sharing together

Capgemini has over fifty years of experience engineering tech-driven transformations for organizations worldwide. In fact, around 85% of the Forbes Global 2000 is affiliated with the company. Today, reliable solutions for data sharing are an integral part of the...
Big things start small: MVDS magic

Big things start small: MVDS magic

The MVDS (Minimum Viable Data Space) is your starter helper for building data spaces. It is a combination of basic components, just enough features to make a data space possible. A lean version – to be usable for secure and sovereign data sharing as specified by...
Global healthcare: sustainable growth through better networking

Global healthcare: sustainable growth through better networking

The health sector is characterized by a large number of different players using different, often closed IT systems, which is why sharing and exchanging data between organizations is highly impeded. When it comes to sharing and exchanging data across national borders,...
Joint development between Japan and Europe in data sovereignty

Joint development between Japan and Europe in data sovereignty

IDSA member NTT is developing a new data sharing platform to work together with European platforms like Catena-X. NTT is going to provide a secure framework that uses hardware encryption technology to process data, keeping the data itself secret – and therefore...