Across
- 4. TCT Application access provisioning is done by?
- 5. Which Predix service is used to store documents in CDA product?
- 6. Security model used by most of the ERP applications
- 9. Re-tag in TCT can be done by?
- 10. Source data ($) for deriving $ Thresholds?
Down
- 1. Regression technique used in Improper Payments model
- 2. Tool currently used for onboarding
- 3. System that makes automated calls from security
- 7. Deep learning architecture used in CDA application
- 8. Greek letter that denotes mean of a statistical distribution
