Beyond the manager mythLet’s talk about something we all know: “You work for your manager, not the company.” It used to be a big deal, and still kind of is…Sep 30, 2023Sep 30, 2023
Challenges for Decentralized IdentityFirst the easy part — passwords are bad. The difficult part — Not many people realize it. Most of hacking-related breaches (over 80%)…May 9, 2022May 9, 2022
Accountable Digital Identity (ADI) — Trust Framework for Human IdentitiesADIA — Layered ModelMay 6, 2022May 6, 2022
Verifiable Credentials — beyond the Hello WorldI write this blog with a bit of concern, not because I am frustrated but after couple of years dabbling with emerging technology but with…May 5, 2022May 5, 2022
MVP and the story of twinsThis story may have a funny ending (dependening upon your sense of humor) or an absolute disaster of me losing one or more linkedIn…Jul 8, 20211Jul 8, 20211
Threats to IT SystemsI was conceptualizing common threats, threat vectors and assets in an enterprise a potential hacker is after. This was part of a much…Jul 7, 2021Jul 7, 2021
4 Smart questions to ask your GDPR and CCPA attorneysImagine this — Last several years, your bank has been trying to integrate all bank accounts and link them with a common identifier — The…Jul 7, 2021Jul 7, 2021
Agile Development is killing Customer ValueYet another daily standup with each team member providing a status of what they did today and I responding with a standard question, “are…Oct 3, 2020Oct 3, 2020