profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass features provided by SolidityClass features provided by SolidityThis article discusses class features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »Integrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — Zigbee editionIntegrating physical devices with IOTA — Zigbee editionHow to install and use Oyente — a smart contract analyzerHow to install and use Oyente — a smart contract analyzerOP PUSH TXOP_PUSH_TXStateful Smart Contracts on Bitcoin SVStateful Smart Contracts on Bitcoin SVLayer 1 Tokens on Bitcoin SVLayer 1 Tokens on Bitcoin SVCreating Your first DAPP: Beginner’s GuideCreating Your first DAPP: Beginner’s GuideCreate your first Hyperledger Fabric blockchain network in less than five minutesCreate your first Hyperledger Fabric blockchain network in less than five minutesLearn how to build your first local Hyperledger Fabric blockchain network from scratch and deploy a smart contract in a few minutes.Continue reading on Coinmonks »

How to Redirect Feed Links to follow.it using .htaccessHow to Redirect Feed Links to follow.it using .htaccessFeedburner used to a powerful tool for RSS feeds publishing and subscriber management. However, feedburner will unlikely leave its maintenance mode because there has been no new features yet less features for quite some years. But RSS feed is still an important part of the Web supported by many software such as WordPress. follow.it is […] The post How to Redirect Feed Links to follow.it using .htaccess is from SysTutorials. How to make Grub2 boot to older kernel version in Ubuntu 20.04How to make Grub2 boot to older kernel version in Ubuntu 20.04In a Linux system, we may have multiple kernels installed. Usually, it is the latest kernel configured to be the default one the system boot loader will use during automatic boot if there is no manual kernel choosing. In many cases, such as there is no driver ready yet for some devices in newer kernels, […] The post How to make Grub2 boot to older kernel version in Ubuntu 20.04 is from SysTutorials. How to Add Inline Comments for Multi-line Command in Bash ScriptHow to Add Inline Comments for Multi-line Command in Bash ScriptIn Bash script, it is common that multiple small commands run together connected by pipes (|) and the whole command is quite long. For clarity, we may write the command in multiple lines. How to add comments for these long multi-line commands? In Bash, the content after # in a line is the comment. Using […] The post How to Add Inline Comments for Multi-line Command in Bash Script is from SysTutorials. How to Match Multiple Lines using Regex in Perl One-linersHow to Match Multiple Lines using Regex in Perl One-linersPerl one-liners with perl’s regular expression statement can be a very powerful text processing tools used as commands in a terminal or a script. By default, the input to the perl one-liner with -p or -n options is passed line by line. However, when we want to match multiple lines, it gets us some trouble. […] The post How to Match Multiple Lines using Regex in Perl One-liners is from SysTutorials. How to Query Transaction By ID in Hyperledger Fabric 2.0How to Query Transaction By ID in Hyperledger Fabric 2.0Querying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related […] The post How to Query Transaction By ID in Hyperledger Fabric 2.0 is from SysTutorials. Blockchain Platforms Introduced, Each in One SentenceBlockchain Platforms Introduced, Each in One SentenceThis post lists some general- and special-purpose blockchains nowadays available with a short description in one sentence. Readers can have a quick understanding of what a blockchain network is built for and what uniqueness that blockchain has. I also give links to beginner friendly resources as learn materials. General purpose blockchains Blockchains for general purpose […] The post Blockchain Platforms Introduced, Each in One Sentence is from SysTutorials. How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04Hyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will […] The post How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04 is from SysTutorials. How to Grep 2 Lines using grep in Linux?How to Grep 2 Lines using grep in Linux?grep is excellent to match patterns from STDOUT/text files in command line or scripts. It’s handy. Sometimes, our problem is more complex than finding a keyword from a file. On a first thought, it may sound impossible using grep for such complex problems. But grep can be quite powerful than we thought. Today, let’s check […] The post How to Grep 2 Lines using grep in Linux? is from SysTutorials. How to Install Go 1.13.x on Ubuntu 18.04How to Install Go 1.13.x on Ubuntu 18.04In Ubuntu 18.04 LTS, the default Go lang version is 1.10. For compatibility reason, the Ubuntu LTS will usually keep the major release version numbers for packages. However, many applications, such as Hyperledger Fabric 2.0, require a newer version of Go. In this post, let’s take a look at how to install a system level […] The post How to Install Go 1.13.x on Ubuntu 18.04 is from SysTutorials. GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleGCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleWe know compilers like gcc can do lots smart optimization to make the program run faster. Regarding functions call optimization, gcc can do tail-call elimination to save the cost of allocating a new stack frame, and tail recursion elimination to turn a recursive function to non-recursive iterative one. gcc can even transform some recursive functions […] The post GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length Example is from SysTutorials. Dynamics 365 Developer Extension is Now Working in Visual Studio 2017Dynamics 365 Developer Extension is Now Working in Visual Studio 2017I don’t know why Jason Lattimer’s D365DeveloperExensions no more working after VS 2017 release? It seems D365DeveloperExtensions anymore supported for newer Visual Studio version. I am pretty much sure, some of you may be still struggling with installing Dynamics 355 Developer extension for your Visual Studio 2017 community or professional edition. Not sure why this tool has been […] The post Dynamics 365 Developer Extension is Now Working in Visual Studio 2017 is from SysTutorials. Bash Learning MaterialsBash Learning MaterialsBash (GNU Bourne-Again SHell) the default shell for many Linux distributions. It is very common for scripting languages in Linux. Bash is easy and straightforward for writing small tools. However, as most tools, it has its grammars that could easily cause bugs if they are not used correctly. Here I summarize a list of good […] The post Bash Learning Materials is from SysTutorials. How to Install Wine 32-bit on CentOS 8How to Install Wine 32-bit on CentOS 8Since version 7, RHEL and CentOS only have 64 bit versions. For some reasons, it’s better to run many Windows applications under 32 bit wine. Like How to Install Wine 32-bit on CentOS 7, this post introduce how to install 32-bit Wine on CentOS 8. Most of the mechanisms are similar yet there are differences. […] The post How to Install Wine 32-bit on CentOS 8 is from SysTutorials. How to Convert Integers to Strings and Strings to Integers in PHPHow to Convert Integers to Strings and Strings to Integers in PHPConversion from integer to string and from string to integer are common operations in most applications such as C++. PHP has its uniqueness in language and standard library design. In this post, we will check methods to convert integers to strings and vice versa. Convert string to int in PHP You can cast a string […] The post How to Convert Integers to Strings and Strings to Integers in PHP is from SysTutorials. How to list and start VirtualBox VMs in command line in Linux?How to list and start VirtualBox VMs in command line in Linux?VirtualBox is a nice open source virtual machine software. It works nicely on Linux and is supported by many Linux distros like Ubuntu in their official package repositories, so it is quite easy to set it up on Linux. The VMs can also be managed in command line using the vboxmanage command line tool provided […] The post How to list and start VirtualBox VMs in command line in Linux? is from SysTutorials. A StoneWall Solution in C++A StoneWall Solution in C++StoneWall is an interesting problem that requires some brain cycles yet not too complex. It is good software engineer interview question. Here is a C++ solution whose complexity is O(N). #include <stack> int solution(std::vector<int> &H) { int stones = 0; std::stack<int> heights; for (auto h: H) { while (!heights.empty() && h < heights.top()) { heights.pop(); […] The post A StoneWall Solution in C++ is from SysTutorials. How to add Gmail SMTP in ThunderbirdHow to add Gmail SMTP in ThunderbirdGmail’s authentication is secured by rejecting access from less secure apps. By default, adding Gmail SMTP in Thunderbird with your Google account password as SMTP authentication password will not work. And Google is beginning to shut off Google Account access to less secure apps. To solve this, the method is to use OAuth2 authentication instead […] The post How to add Gmail SMTP in Thunderbird is from SysTutorials. How to synchronize OneDrive and OneDrive for Business files in Linux using InsyncHow to synchronize OneDrive and OneDrive for Business files in Linux using InsyncOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software […] The post How to synchronize OneDrive and OneDrive for Business files in Linux using Insync is from SysTutorials. How to list all commits in a git repositoryHow to list all commits in a git repository`git log` only list all the commits in the current working branch. For some cases, we may want to list all the commits in a git repository. The `git log` command does not do this. But there are other supports in `git` that can do so. The command to list all commits is git rev-list […] The post How to list all commits in a git repository is from SysTutorials. How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux? To generate an RSA private key: openssl genrsa -out private.pem 2048 To generate the RSA public key from the RSA private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem The post How to generate a pair of RSA private and public key in Linux? is from SysTutorials.

Hyperledger Use Case, in HealthcareHyperledger Use Case, in HealthcareHyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Hyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Blockchain Interoperability in 2020: A 4-Minute ReviewBlockchain Interoperability in 2020: A 4-Minute Review330 documents analysed, 30 people contacted to categorize the latest blockchain interoperability solutions.Continue reading on Coinmonks »Install and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSInstall and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSHow to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkHow to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkIntroductionContinue reading on Coinmonks »Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…An Implementation of a REST API to your custom Network with ExpressJS & Node.jsAn Implementation of a REST API to your custom Network with ExpressJS & Node.jsCreate a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Create a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Hyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkHyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkThe Chaincode Lifecycle on Hyperledger Fabric v2The Chaincode Lifecycle on Hyperledger Fabric v2

Singapore’s Central Bank Eyes Commercial Role for Its Blockchain Payments TechSingapore’s Central Bank Eyes Commercial Role for Its Blockchain Payments TechProject Ubin has completed its last development phase and is now being considered as the basis for commercial digital currency ventures.CoinSwap and the Ongoing Effort to Make Bitcoin Privacy ‘Invisible’CoinSwap and the Ongoing Effort to Make Bitcoin Privacy ‘Invisible’Developer Chris Belcher has set his sights on making CoinSwap a reality – a new project he hopes will "massively improve bitcoin privacy."Inside the Craze for Filecoin Crypto Mining in ChinaInside the Craze for Filecoin Crypto Mining in ChinaAs Filecoin inches closer to a blockchain mainnet launch, investors in China are again speculating heavily on the network’s mining hardware and token prices.Crypto Long & Short: Dogecoin, Market Manipulation and the Downside of a Coinbase IPOCrypto Long & Short: Dogecoin, Market Manipulation and the Downside of a Coinbase IPONoelle Acheson explains how the dogecoin rise exemplifies the creative destruction underway in markets, and what a potential Coinbase listing could mean for the development of crypto. Does COVID-19 Have the World Rethinking Dollar Supremacy?Does COVID-19 Have the World Rethinking Dollar Supremacy?A reading of a piece by a Yale professor and former head of Morgan Stanley Asia arguing the dollar’s status is changing rapidly.Listen: What a Bitcoin Researcher Says About LightningListen: What a Bitcoin Researcher Says About LightningChaincode Labs researcher Clara Shikhelman has been studying mathematics in university since she was 14 years old. Now, as the bitcoin company’s newest post-doctoral fellow, she is exploring ways to optimize the Lightning Network.Hyper-Stablecoinization: From Eurodollars to Crypto-DollarsHyper-Stablecoinization: From Eurodollars to Crypto-DollarsCrypto-dollarization is the world's next best hope to meet its insatiable demand for U.S. dollars.The Mixed Signals Economy: The Breakdown Weekly RecapThe Mixed Signals Economy: The Breakdown Weekly RecapJobless claims are down, coronavirus cases are up and the markets simply don’t know what to do.Sale of the Century: The Inside Story of Ethereum’s 2014 PremineSale of the Century: The Inside Story of Ethereum’s 2014 Premine"Now anyone could be an investor in one of the most cutting-edge technology companies out there. All they needed was an internet connection and at least 0.01 bitcoin."Attempted 51% Attack on Bitcoin Gold Was Thwarted, Developers SayAttempted 51% Attack on Bitcoin Gold Was Thwarted, Developers SayA 51 percent attack on Bitcoin Gold was unsuccessful.Telegram’s Defeat Isn’t ‘Binding’ in Kik Case, Judge Tells SECTelegram’s Defeat Isn’t ‘Binding’ in Kik Case, Judge Tells SECKik's proverbial day in court may take a lot longer than Telegram's, if the judge’s response to the SEC during a hearing this week is any indication.Market Wrap: Traders Buy the Dip and Bitcoin Holds at $9,200Market Wrap: Traders Buy the Dip and Bitcoin Holds at $9,200Bitcoin sticks to the $9,200 price range after some light selling early in the day. You Can’t Fight Outrage Culture With More Outrage, Feat. Michael KriegerYou Can’t Fight Outrage Culture With More Outrage, Feat. Michael KriegerFor a decade, Liberty Blitzkrieg has been an essential alternative financial and cultural voice. Here’s why it’s ending. Bitcoin App Bottlepay Is Back From the Dead With a New Lightning AppBitcoin App Bottlepay Is Back From the Dead With a New Lightning AppBottlepay remodeled its whole product to comply with EU regulations. Roughly 1,000 people are now on the waitlist for the app's relaunch.Bitcoin Reaches Record High Correlation to S&P 500Bitcoin Reaches Record High Correlation to S&P 500Analysts expect bitcoin’s positive correlation to traditional markets to continue and strengthen.Money Reimagined: COVID-19’s Crash Course in Exponential MathMoney Reimagined: COVID-19’s Crash Course in Exponential MathMoney requires a network effect, helped by the self-reinforcing idea that “everyone’s using it because everyone’s using it.” Bitcoin Wallet Electrum Now Supports Lightning, Watchtowers and Submarine SwapsBitcoin Wallet Electrum Now Supports Lightning, Watchtowers and Submarine SwapsIn its latest major release, Electrum now supports a number of innovations that could make using Lightning more secure and less bumpy for users.Blockchain Bites: Coinbase’s Untraditional Investor Day and the Ethereum-EOS Arms Race in Latin AmericaBlockchain Bites: Coinbase’s Untraditional Investor Day and the Ethereum-EOS Arms Race in Latin AmericaCoinbase will host its first investor day while a protocol arms race unfolds in Latin America. Bitcoin News Roundup for July 10, 2020Bitcoin News Roundup for July 10, 2020With the price of BTC headed down and the Fed's largest balance sheet decline in 11 years, CoinDesk's Markets Daily is back for your bitcoin news roundup!Cardano Creator Compares Criticism of Project to ‘Trump Derangement Syndrome’Cardano Creator Compares Criticism of Project to ‘Trump Derangement Syndrome’Infighting is hurting crypto, IOHK's Charles Hoskinson says, but he won't "apologize for kicking people in the teeth" on Twitter if someone is attacking Cardano or its community.

Ethereum 2.0 is getting closerEthereum 2.0 is getting closerThe Ethereum NetworkContinue reading on Coinmonks »Web3.go Part 1Web3.go Part 1Coinbase Plans To Go Public / DiDi Trialing China’s CBDC / Dfinity Opens Internet ComputerCoinbase Plans To Go Public / DiDi Trialing China’s CBDC / Dfinity Opens Internet ComputerHow To Display Voting Results from Blockchain On UIHow To Display Voting Results from Blockchain On UIDeFi Yield Farming and Liquidity MiningDeFi Yield Farming and Liquidity MiningCrypto and network effectsCrypto and network effectsIdeas that propagate, and the staying power of network effectsContinue reading on Coinmonks »Vanguard’s Blockchain Platform Goes Live / China’s Full DLT Strategy / Blockchain For ERP…Vanguard’s Blockchain Platform Goes Live / China’s Full DLT Strategy / Blockchain For ERP…A World Without (block) Limits!A World Without (block) Limits!Solidity’s Cheap Public FaceSolidity’s Cheap Public FaceThis article discusses automatic storage getters provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »Create an Ethereum Wallet in iOS — Part 1Create an Ethereum Wallet in iOS — Part 1Nowadays, blockchain becomes more and more popular, lots of startups, applications spring up in this decade. Traditional banks are trying…Continue reading on Coinmonks »

Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Gartner announced the vendors selected to the 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM). According to Gartner, it bases its Peer Insights Customers’ Choice on customer feedback and ratings, taking into account both the number of reviews and the overall user ratings of verified end-users. Gartner maintains rigorous criteria for […] The post Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM) appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 2020 Vendors to Know: SOAR2020 Vendors to Know: SOARSolutions Review’s listing of the Vendors to Know: SOAR is a mashup of products that best represent current market conditions, according to the crowd. Our editors selected the privileged access management products listed here based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites […] The post 2020 Vendors to Know: SOAR appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Should We Move to a New Definition of SIEM?Should We Move to a New Definition of SIEM?Should we move to a new definition of SIEM? What should experts and enterprises consider and discuss in relation to SIEM solutions?  Why do we need to consider a new definition of SIEM? IT decision-makers across the U.S. still don’t think of SIEM as a necessary component of their modern cybersecurity platforms. Previously, SIEM only […] The post Should We Move to a New Definition of SIEM? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. How SIEM Solutions Help Mitigate Insider ThreatsHow SIEM Solutions Help Mitigate Insider ThreatsHow does SIEM mitigate insider threats? How do insider threats threaten your enterprise and its data? What can you do to prevent insider threats in the first place? Insider threats refer to hacks and cyberattacks that come from within your own workforce and employees rather than an external attacker. Often, these insider threats stem from […] The post How SIEM Solutions Help Mitigate Insider Threats appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Tech Industry Leaders On the Post-Pandemic Cybersecurity LandscapeTech Industry Leaders On the Post-Pandemic Cybersecurity LandscapeWhether or not the U.S.A. approaches the end of the COVID-19 pandemic, enterprises seem poised to return to business-as-normal as soon as possible. But what does a post-pandemic business world look like? Moreover, what does a post-pandemic cybersecurity landscape look like?  We spoke with experts from Exabeam, Tempered, and WhiteHat Security for their takes on […] The post Tech Industry Leaders On the Post-Pandemic Cybersecurity Landscape appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Hundreds of Police Departments Info Exposed in BlueLeaksHundreds of Police Departments Info Exposed in BlueLeaksKrebsonSecurity recently reported the leak of hundreds of thousands of potentially sensitive files from police departments across the U.S.  According to a post on KrebsonSecurity, the so-called “BlueLeaks” leaks made critical files searchable online. It appears to index years of data from police departments, fusion centers, and other law enforcement resources. A fusion center is […] The post Hundreds of Police Departments Info Exposed in BlueLeaks appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Cybersecurity Must Deal with the Professional HackerCybersecurity Must Deal with the Professional HackerBusiness cybersecurity must contend with a new kind of threat: the professional hacker. For years, the discourse around hackers pictured them as basement dwellers with black hoodies. However, this image no longer reflects reality.  The professional hacker now works within a corporate structure and can benefit from a network of fellow professionals. As a result, […] The post Cybersecurity Must Deal with the Professional Hacker appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Exabeam Releases 2020 State of the SOC ReportExabeam Releases 2020 State of the SOC ReportExabeam today released the 2020 State of the SOC Report. This report seeks to understand the effectiveness of modern security operations centers (SOCs) through comparison. The Exabeam 2020 State of the SOC Report surveyed CISOs, CIOs, and security managers from around the world. Additionally, it covered topics including basic SOC operations, operational processes, technology, and […] The post Exabeam Releases 2020 State of the SOC Report appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Three Potential Challenges in SIEM MaintenanceThree Potential Challenges in SIEM MaintenanceWhat are the three potential challenges in SIEM maintenance facing enterprises today? How can your enterprise prepare for them, and what other obstacles might you face?  SIEM possesses a reputation as complicated and expensive compared to other branches of cybersecurity. While this reputation often becomes over-exaggerated, it remains rooted in fact. However, your enterprise can […] The post Three Potential Challenges in SIEM Maintenance appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Siemplify Announces Cloud-Native SOAR PlatformSiemplify Announces Cloud-Native SOAR PlatformSiemplify today announced the release of the Siemplify Cloud, a cloud-native security operations platform. The Siemplify Cloud enables end-users and managed security services providers (MSSPs) to quickly derive value from security orchestration, automation, and response (SOAR). Moreover, it seeks to reduce the complexity involved in deploying, maintaining, and operating a SOAR platform.    Siemplify provides SOAR […] The post Siemplify Announces Cloud-Native SOAR Platform appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)How to overcome the top challenges of achieving identity resolution How to overcome the top challenges of achieving identity resolution No matter the enterprise industry, common business practices today require personalization at scale, in terms of both volume and speed of resolution, with identity resolution at the core. Identity resolution consists of combining what is already known about individuals through personally identifiable information (PII) such as email, mailing address, birthday, home and mobile phone numbers, or other first-party identifiers, with data that marketers can purchase from a third-party to know more about the individuals, and information that marketers still need directly from individuals to complete a profile. This is an important element of establishing a competitive advantage in any industry as identity resolution allows for improved personalization, omnichannel orchestration, and real-time engagement that leads to increased customer retention, loyalty, and ultimately revenue growth.To read this article in full, please click here