FLOW

FLOW (Federated Local Open Workspace)

FLOW enables secure data collaboration without centralisation. Rather than consolidating data into shared repositories, FLOW allows computation to occur at the data source. This architectural adaptability distinguishes it from traditional federated learning – organisations can implement centralised, decentralised, or hybrid STREAM models based on specific business requirements and regulatory constraints.

FLOW’s multiple pillars work together to enable secure data acquisition, computation and commercialisation. Distributed data assets serve as a foundational element of the framework. FLOW maintains data locally, enabling secure access and computation. Combined with other pillars, it creates a comprehensive system that preserves data sovereignty, unlocking the collaborative value of distributed information resources. The decentralised infrastructure serves multiple critical functions:

(i) It preserves organisational data sovereignty by keeping data under local control. Each department or entity maintains authority over its data assets, determining how they are used and shared. This is crucial for organisations operating across different regulatory jurisdictions or handling sensitive information.

(ii) It naturally aligns with privacy requirements and regulations. Organisations can implement granular access controls and maintain clear audit trails. This becomes especially important when dealing with personal data subject to regulations like GDPR or HIPAA.

(iii) Distributed data assets enable selective sharing without compromising security. Organisations can participate in federated computations controlling their raw data and sharing only the necessary computed results or aggregated insights.

(iv) FLOW’s adaptive APIs provide standardised communication mechanisms for diverse stakeholders, such as data producers, consumers, and regulatory authorities, enabling secure interactions across the ecosystem. Adaptive APIs ensure automated modular integration of federated services, allowing organisations to expose specific data or computational services. For example, a healthcare provider can use a FLOW Adaptive API to request analysis of anonymised patient data from multiple hospitals without needing to understand each institution’s internal systems.

(v) FLOW enforces secure authentication and authorisation, ensuring that only authorised entities can access or contribute to federated computations.