profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Integrating physical devices with IOTA — Zigbee editionIntegrating physical devices with IOTA — Zigbee editionHow to install and use Oyente — a smart contract analyzerHow to install and use Oyente — a smart contract analyzerOP PUSH TXOP_PUSH_TXStateful Smart Contracts on Bitcoin SVStateful Smart Contracts on Bitcoin SVLayer 1 Tokens on Bitcoin SVLayer 1 Tokens on Bitcoin SVCreating Your first DAPP: Beginner’s GuideCreating Your first DAPP: Beginner’s GuideCreate your first Hyperledger Fabric blockchain network in less than five minutesCreate your first Hyperledger Fabric blockchain network in less than five minutesLearn how to build your first local Hyperledger Fabric blockchain network from scratch and deploy a smart contract in a few minutes.Continue reading on Coinmonks »Getting started with LigoGetting started with LigoGetting started with Ligo (Part 2)Getting started with Ligo (Part 2)Building dAPPs as a Bhad Guy: Part TwoBuilding dAPPs as a Bhad Guy: Part Two

How to Add Inline Comments for Multi-line Command in Bash ScriptHow to Add Inline Comments for Multi-line Command in Bash ScriptIn Bash script, it is common that multiple small commands run together connected by pipes (|) and the whole command is quite long. For clarity, we may write the command in multiple lines. How to add comments for these long multi-line commands? In Bash, the content after # in a line is the comment. Using […] The post How to Add Inline Comments for Multi-line Command in Bash Script is from SysTutorials. How to Match Multiple Lines using Regex in Perl One-linersHow to Match Multiple Lines using Regex in Perl One-linersPerl one-liners with perl’s regular expression statement can be a very powerful text processing tools used as commands in a terminal or a script. By default, the input to the perl one-liner with -p or -n options is passed line by line. However, when we want to match multiple lines, it gets us some trouble. […] The post How to Match Multiple Lines using Regex in Perl One-liners is from SysTutorials. How to Query Transaction By ID in Hyperledger Fabric 2.0How to Query Transaction By ID in Hyperledger Fabric 2.0Querying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related […] The post How to Query Transaction By ID in Hyperledger Fabric 2.0 is from SysTutorials. Blockchain Platforms Introduced, Each in One SentenceBlockchain Platforms Introduced, Each in One SentenceThis post lists some general- and special-purpose blockchains nowadays available with a short description in one sentence. Readers can have a quick understanding of what a blockchain network is built for and what uniqueness that blockchain has. I also give links to beginner friendly resources as learn materials. General purpose blockchains Blockchains for general purpose […] The post Blockchain Platforms Introduced, Each in One Sentence is from SysTutorials. How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04Hyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will […] The post How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04 is from SysTutorials. How to Grep 2 Lines using grep in Linux?How to Grep 2 Lines using grep in Linux?grep is excellent to match patterns from STDOUT/text files in command line or scripts. It’s handy. Sometimes, our problem is more complex than finding a keyword from a file. On a first thought, it may sound impossible using grep for such complex problems. But grep can be quite powerful than we thought. Today, let’s check […] The post How to Grep 2 Lines using grep in Linux? is from SysTutorials. How to Install Go 1.13.x on Ubuntu 18.04How to Install Go 1.13.x on Ubuntu 18.04In Ubuntu 18.04 LTS, the default Go lang version is 1.10. For compatibility reason, the Ubuntu LTS will usually keep the major release version numbers for packages. However, many applications, such as Hyperledger Fabric 2.0, require a newer version of Go. In this post, let’s take a look at how to install a system level […] The post How to Install Go 1.13.x on Ubuntu 18.04 is from SysTutorials. GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleGCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleWe know compilers like gcc can do lots smart optimization to make the program run faster. Regarding functions call optimization, gcc can do tail-call elimination to save the cost of allocating a new stack frame, and tail recursion elimination to turn a recursive function to non-recursive iterative one. gcc can even transform some recursive functions […] The post GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length Example is from SysTutorials. Dynamics 365 Developer Extension is Now Working in Visual Studio 2017Dynamics 365 Developer Extension is Now Working in Visual Studio 2017I don’t know why Jason Lattimer’s D365DeveloperExensions no more working after VS 2017 release? It seems D365DeveloperExtensions anymore supported for newer Visual Studio version. I am pretty much sure, some of you may be still struggling with installing Dynamics 355 Developer extension for your Visual Studio 2017 community or professional edition. Not sure why this tool has been […] The post Dynamics 365 Developer Extension is Now Working in Visual Studio 2017 is from SysTutorials. Bash Learning MaterialsBash Learning MaterialsBash (GNU Bourne-Again SHell) the default shell for many Linux distributions. It is very common for scripting languages in Linux. Bash is easy and straightforward for writing small tools. However, as most tools, it has its grammars that could easily cause bugs if they are not used correctly. Here I summarize a list of good […] The post Bash Learning Materials is from SysTutorials. How to Install Wine 32-bit on CentOS 8How to Install Wine 32-bit on CentOS 8Since version 7, RHEL and CentOS only have 64 bit versions. For some reasons, it’s better to run many Windows applications under 32 bit wine. Like How to Install Wine 32-bit on CentOS 7, this post introduce how to install 32-bit Wine on CentOS 8. Most of the mechanisms are similar yet there are differences. […] The post How to Install Wine 32-bit on CentOS 8 is from SysTutorials. How to Convert Integers to Strings and Strings to Integers in PHPHow to Convert Integers to Strings and Strings to Integers in PHPConversion from integer to string and from string to integer are common operations in most applications such as C++. PHP has its uniqueness in language and standard library design. In this post, we will check methods to convert integers to strings and vice versa. Convert string to int in PHP You can cast a string […] The post How to Convert Integers to Strings and Strings to Integers in PHP is from SysTutorials. How to list and start VirtualBox VMs in command line in Linux?How to list and start VirtualBox VMs in command line in Linux?VirtualBox is a nice open source virtual machine software. It works nicely on Linux and is supported by many Linux distros like Ubuntu in their official package repositories, so it is quite easy to set it up on Linux. The VMs can also be managed in command line using the vboxmanage command line tool provided […] The post How to list and start VirtualBox VMs in command line in Linux? is from SysTutorials. A StoneWall Solution in C++A StoneWall Solution in C++StoneWall is an interesting problem that requires some brain cycles yet not too complex. It is good software engineer interview question. Here is a C++ solution whose complexity is O(N). #include <stack> int solution(std::vector<int> &H) { int stones = 0; std::stack<int> heights; for (auto h: H) { while (!heights.empty() && h < heights.top()) { heights.pop(); […] The post A StoneWall Solution in C++ is from SysTutorials. How to add Gmail SMTP in ThunderbirdHow to add Gmail SMTP in ThunderbirdGmail’s authentication is secured by rejecting access from less secure apps. By default, adding Gmail SMTP in Thunderbird with your Google account password as SMTP authentication password will not work. And Google is beginning to shut off Google Account access to less secure apps. To solve this, the method is to use OAuth2 authentication instead […] The post How to add Gmail SMTP in Thunderbird is from SysTutorials. How to synchronize OneDrive and OneDrive for Business files in Linux using InsyncHow to synchronize OneDrive and OneDrive for Business files in Linux using InsyncOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software […] The post How to synchronize OneDrive and OneDrive for Business files in Linux using Insync is from SysTutorials. How to list all commits in a git repositoryHow to list all commits in a git repository`git log` only list all the commits in the current working branch. For some cases, we may want to list all the commits in a git repository. The `git log` command does not do this. But there are other supports in `git` that can do so. The command to list all commits is git rev-list […] The post How to list all commits in a git repository is from SysTutorials. How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux? To generate an RSA private key: openssl genrsa -out private.pem 2048 To generate the RSA public key from the RSA private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem The post How to generate a pair of RSA private and public key in Linux? is from SysTutorials. How to encrypt a file using openssl on Linux non-interactively?How to encrypt a file using openssl on Linux non-interactively?How to encrypt a file using openssl on Linux non-interactively? The passphrase shall be provied to openssl in a programmatic way instead of requesting the user to input it, so that the command may work in a regular cron job or some batch jobs. To encrypt file file.tgz and store it to file.tgz using aes-256-ebc […] The post How to encrypt a file using openssl on Linux non-interactively? is from SysTutorials. Xen: VM failed to bootXen: VM failed to bootQuestion: Hello, I am using Xen on Centos 7 and it was working fine from last 3 years. After I reboot the VM I am getting below error: "dracut-initqueue[270]: Warning: dracut-initqueue timeout - starting timeout scripts" "[ 195.426203] dracut-initqueue[270]: Warning: Could not boot. [ 195.435712] dracut-initqueue[270]: Warning: /dev/centos_static/root does not exist [ 195.436499] dracut-initqueue[270]: Warning: […] The post Xen: VM failed to boot is from SysTutorials.

Blockchain Interoperability in 2020: A 4-Minute ReviewBlockchain Interoperability in 2020: A 4-Minute Review330 documents analysed, 30 people contacted to categorize the latest blockchain interoperability solutions.Continue reading on Coinmonks »Install and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSInstall and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSHow to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkHow to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkIntroductionContinue reading on Coinmonks »Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…An Implementation of a REST API to your custom Network with ExpressJS & Node.jsAn Implementation of a REST API to your custom Network with ExpressJS & Node.jsCreate a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Create a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Hyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkHyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkThe Chaincode Lifecycle on Hyperledger Fabric v2The Chaincode Lifecycle on Hyperledger Fabric v2Creating a Hyperledger Fabric 2 network template in four simples stepsCreating a Hyperledger Fabric 2 network template in four simples stepsIntroductionContinue reading on Coinmonks »On The State Of Adoption In Decentralised FinanceOn The State Of Adoption In Decentralised Finance

Bitcoin Is a Way to Repair Economic Injustice: Author Isaiah JacksonBitcoin Is a Way to Repair Economic Injustice: Author Isaiah JacksonThere are no easy technological solutions to racial tensions, police brutality or economic insecurity. Still, bitcoin could help black Americans, says author Isaiah Jackson.EU’s Europol: Bitcoin Privacy Wallet ‘Not Looking Good’ For Law EnforcementEU’s Europol: Bitcoin Privacy Wallet ‘Not Looking Good’ For Law EnforcementEuropol, the European Union's law enforcement agency, has its eyes on the popular bitcoin privacy tool Wasabi Wallet, documents verified by CoinDesk show. Lawsuit Accuses Xapo, Indodax of Negligently Holding Stolen BitcoinLawsuit Accuses Xapo, Indodax of Negligently Holding Stolen BitcoinA crypto trader is trying to seize nearly 500 bitcoin from exchanges Xapo and Indodax through a new lawsuit that accuses the two crypto exchanges of harboring his stolen funds.US Bank Regulator OCC Asks for Public Input on Cryptocurrency Use in Financial SectorUS Bank Regulator OCC Asks for Public Input on Cryptocurrency Use in Financial SectorA federal banking regulator is seeking public input on how cryptocurrencies interact with the national banking system and financial institutions.Market Wrap: Bitcoin Closing in on $9,900 as Crypto Market Volatility PersistsMarket Wrap: Bitcoin Closing in on $9,900 as Crypto Market Volatility PersistsCrypto derivatives volume had a record month in May - and volatility contributes to fueling that growth. MakerDAO Weighs Accepting Real-World Assets as Crypto Loan CollateralMakerDAO Weighs Accepting Real-World Assets as Crypto Loan CollateralDecentralized finance (DeFi) may soon boast a real-world use case as MakerDao considers accepting freight invoices as collateral for DAI loans.Crypto Derivative Volumes Hit Record $602B in May: ReportCrypto Derivative Volumes Hit Record $602B in May: ReportA flurry of activity around the bitcoin halving led to crypto derivatives volumes in May gaining key market share against spot volumes.The Mirage of the Money Printer: Why the Fed Is More PR Than Policy, Feat. Jeffrey P. SniderThe Mirage of the Money Printer: Why the Fed Is More PR Than Policy, Feat. Jeffrey P. SniderThe meme is “money printer go brrr,” but according to this macro expert, central banks have almost no power to actually influence money itself.Decentralization and What Section 230 Really Means for Freedom of SpeechDecentralization and What Section 230 Really Means for Freedom of SpeechWith U.S. President Donald Trump clashing with social media behemoth Twitter, what does the fight over “Section 230” really mean and can decentralization offer a better solution?Blockchain Bites: Bitmain’s Shakeup, Bitcoin’s Resilience and Ethereum’s AnonymityBlockchain Bites: Bitmain’s Shakeup, Bitcoin’s Resilience and Ethereum’s AnonymityBitmain's ousted co-founder reportedly retook the company's office building while a protocol update made Bitcoin more resilient to state attacks. Bitcoin News Roundup for June 4, 2020Bitcoin News Roundup for June 4, 2020Bloomberg thinks BTC could hit $20K. It's CoinDesk's Markets Daily Podcast.Bittrex, Poloniex Added to Lawsuit Claiming Tether Manipulated Bitcoin MarketBittrex, Poloniex Added to Lawsuit Claiming Tether Manipulated Bitcoin MarketAn amended lawsuit alleging Tether and Bitfinex manipulated the bitcoin market is now claiming Poloniex and Bittrex were also involved.Bitmain’s Feuding Co-Founders Are Fracturing the Firm and Staff Are Caught in the MiddleBitmain’s Feuding Co-Founders Are Fracturing the Firm and Staff Are Caught in the MiddleStaff at bitcoin miner manufacturer Bitmain are being forced to choose between its two co-founders as a long-running feud over control of the firm worsens.Japan’s Biggest Banks Are Talking About Building a Digital Payments SystemJapan’s Biggest Banks Are Talking About Building a Digital Payments SystemThe banks will be joined by representatives from big business and the government to lay out how to create shared digital payments system.Bitcoin Mining Difficulty Drops 9% to January LevelsBitcoin Mining Difficulty Drops 9% to January LevelsBitcoin has just got easier to mine while major manufacturers have started shipping their latest machines ahead of China's rainy summer season.Crypto-Friendly Arival Bank Is Launching Today for Those Willing to Disclose Their BagsCrypto-Friendly Arival Bank Is Launching Today for Those Willing to Disclose Their BagsAfter two years of laying groundwork, crypto-friendly Arival Bank is launching in beta Thursday. But there’s a catch: clients must disclose all wallets.Bloomberg Analysts Predict $20K Bitcoin This YearBloomberg Analysts Predict $20K Bitcoin This YearBloomberg analysts argue that historical patterns and macro factors mean prices are on a path back the the all-time high. First Mover: Bitcoin Market, Like Wall Street, Shrugs Off Nationwide ProtestsFirst Mover: Bitcoin Market, Like Wall Street, Shrugs Off Nationwide ProtestsProtests over the death of George Floyd in Minneapolis could have implications for inflation and trust in the financial system. Ex-Yang Aide Is Running for Congress with Bitcoin and UBI on His MindEx-Yang Aide Is Running for Congress with Bitcoin and UBI on His MindA former Yang aide running for Congress sees Bitcoin as a liberator, New York’s BitLicense as a hindrance and universal basic income as an imperative. The Neil Ferguson Affair Shows the Limits of Science During COVID-19The Neil Ferguson Affair Shows the Limits of Science During COVID-19The depth of the outrage reveals how scandalized the public can become when trusted institutions are shown to be less reliable than expected.

How to build a dapp on a private Ethereum network : Part — 5How to build a dapp on a private Ethereum network : Part — 5What is Ethereum 2.0?What is Ethereum 2.0?Is a frequently used term but what is underlying it?Continue reading on Coinmonks »Key elements to start building a trading systemKey elements to start building a trading systemHow to add liquidity to the Behodler DEXHow to add liquidity to the Behodler DEXFlattening your Solidity filesFlattening your Solidity filesThis article is geared towards thoseContinue reading on Coinmonks »Calculating Uniswap V2 FeesCalculating Uniswap V2 FeesToken Bonding Curves, the MovieToken Bonding Curves, the MovieSolidity Unit Testing with Remix IDE — A Few Missing PiecesSolidity Unit Testing with Remix IDE — A Few Missing PiecesTencent investing $70 Bn Including Blockchain / France Successfully Tests Digital Euro / U.S.Tencent investing $70 Bn Including Blockchain / France Successfully Tests Digital Euro / U.S.What is a Hash?What is a Hash?

By the Numbers: Business SIEM in 2020By the Numbers: Business SIEM in 2020Solutions Review presents By the Numbers: Business SIEM in 2020. Every year places new and evolving challenges at the feet of cybersecurity solutions. Thus, providers constantly work to uncover and incorporate the most up-to-date threat intelligence and adjust their solutions accordingly.  However, for optimal SIEM in 2020, you need to understand the threat landscape and […] The post By the Numbers: Business SIEM in 2020 appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. How SIEM Improves Business Incident Response PlansHow SIEM Improves Business Incident Response PlansHow does SIEM improve businesses’ incident response? Why does incident response matter in next-generation cybersecurity?  Much of the discussion of cybersecurity by IT decision-makers focuses on the deflection and repelling of cyberattacks. Granted, this represents a vital component of cybersecurity; the more threats you can deter or prevent, the less damage hackers can do to […] The post How SIEM Improves Business Incident Response Plans appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Revisiting Whether SOAR Will Replace SIEM in Business CybersecurityRevisiting Whether SOAR Will Replace SIEM in Business CybersecurityNot long ago, Solutions Review posted “Will SOAR Cybersecurity Replace SIEM in the Near Future?” This article debated the merits between two of the more complex but still vital branches of the modern cybersecurity tree. Ultimately, we left it to the reader to decide, while exploring the merits of both solutions—SOAR (Security Operations, Automation, and […] The post Revisiting Whether SOAR Will Replace SIEM in Business Cybersecurity appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Changing SIEM From Reactive to Proactive with Threat HuntingChanging SIEM From Reactive to Proactive with Threat HuntingWhat does it mean to change your SIEM solution from reactive to proactive? How does threat hunting help that transition in business cybersecurity and SIEM?  SIEM provides critical capabilities to organizations’ cybersecurity policies. In fact, it offers the power of effective log management; this collects security events from disparate network locations and compiles them in […] The post Changing SIEM From Reactive to Proactive with Threat Hunting appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Top-Down SIEM: An Interview with Avi Chesla of EmpowTop-Down SIEM: An Interview with Avi Chesla of EmpowEnterprises still struggle to understand the implications and proper deployment of SIEM. In fact, of all the branches of modern cybersecurity, SIEM often poses the most challenges. However, the advent of top-down SIEM could change all of that. To find out more, we spoke with Avi Chesla of empow in an in-depth interview which covered […] The post Top-Down SIEM: An Interview with Avi Chesla of Empow appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees”Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees”Securonix today released the Securonix 2020 Insider Threat Report. This report analyzed more than 300 confirmed incidents to find significant patterns in insider threats. Among its key findings, Securonix analyzed the risks associated with “flight-risk” individuals.  Securonix positions itself as a next-generation SIEM and user and entity behavior analytics (UEBA) solution provider. Moreover, it features […] The post Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees” appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Focusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empowFocusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empowBy Haim Zlatokrilov, VP of Products at empow As the world goes through the worst health crisis in a century, and the first one occurring in the digital age, we are learning on the go. One of the only ways we can learn is to analyze how different countries with different approaches have dealt with […] The post Focusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empow appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19Tripwire today announced the results of a survey conducted by Dimensional Research exploring cybersecurity concerns during the COVID-19 crisis. Dimensional Research conducted the survey over April 14 through April 21, 2020, which includes responses from 345 IT security professionals.  Tripwire is a cybersecurity provider specializing in security and compliance automation. It works to protect the […] The post Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19 appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Will SOAR Cybersecurity Replace SIEM in the Near Future?Will SOAR Cybersecurity Replace SIEM in the Near Future?Will SOAR (security orchestration, automation, and response) once day replace Security Information and Event Management (SIEM)? If so, why would SOAR replace SIEM? Have the lines between the two solutions blurred, and if so how?  After all, SIEM now features some automation and response capabilities. Either through innovation or acquisition, SIEM solutions often boast SOAR […] The post Will SOAR Cybersecurity Replace SIEM in the Near Future? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. FireEye and Mandiant Security Validation Find Limited Cybersecurity EffectivenessFireEye and Mandiant Security Validation Find Limited Cybersecurity EffectivenessFireEye, via the Mandiant Security Validation (formerly Verodin) team, released the Mandiant Security Effectiveness Report 2020. This report reveals how well businesses protect themselves against cyber threats and the overall effectiveness of their security infrastructure. The data comes from thousands of tests performed by the team which simulated real attacks and malicious behaviors; the Mandiant […] The post FireEye and Mandiant Security Validation Find Limited Cybersecurity Effectiveness appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)How to overcome the top challenges of achieving identity resolution How to overcome the top challenges of achieving identity resolution No matter the enterprise industry, common business practices today require personalization at scale, in terms of both volume and speed of resolution, with identity resolution at the core. Identity resolution consists of combining what is already known about individuals through personally identifiable information (PII) such as email, mailing address, birthday, home and mobile phone numbers, or other first-party identifiers, with data that marketers can purchase from a third-party to know more about the individuals, and information that marketers still need directly from individuals to complete a profile. This is an important element of establishing a competitive advantage in any industry as identity resolution allows for improved personalization, omnichannel orchestration, and real-time engagement that leads to increased customer retention, loyalty, and ultimately revenue growth.To read this article in full, please click hereFlex strengthens supply chain with IAMFlex strengthens supply chain with IAMCompanies that depend on vast supply chains to produce their wares tend to work with hundreds or even thousands of partners, many of which require an online portal — or several — with which to share information. Flex, the $26 billion supply chain technology company formerly known as Flextronics, is no exception.To read this article in full, please click here(Insider Story)