profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

How to install and use Oyente — a smart contract analyzerHow to install and use Oyente — a smart contract analyzerOP PUSH TXOP_PUSH_TXStateful Smart Contracts on Bitcoin SVStateful Smart Contracts on Bitcoin SVLayer 1 Tokens on Bitcoin SVLayer 1 Tokens on Bitcoin SVCreating Your first DAPP: Beginner’s GuideCreating Your first DAPP: Beginner’s GuideCreate your first Hyperledger Fabric blockchain network in less than five minutesCreate your first Hyperledger Fabric blockchain network in less than five minutesLearn how to build your first local Hyperledger Fabric blockchain network from scratch and deploy a smart contract in a few minutes.Continue reading on Coinmonks »Getting started with LigoGetting started with LigoGetting started with Ligo (Part 2)Getting started with Ligo (Part 2)Building dAPPs as a Bhad Guy: Part TwoBuilding dAPPs as a Bhad Guy: Part TwoBuilding a Twitter Bot using IPFS Cluster Building a Twitter Bot using IPFS Cluster This article was first published on our open-source platform, SimpleAsWater.com. If you are interested in IPFS, Libp2p, Ethereum…Continue reading on Coinmonks »

How to Add Inline Comments for Multi-line Command in Bash ScriptHow to Add Inline Comments for Multi-line Command in Bash ScriptIn Bash script, it is common that multiple small commands run together connected by pipes (|) and the whole command is quite long. For clarity, we may write the command in multiple lines. How to add comments for these long multi-line commands? In Bash, the content after # in a line is the comment. Using […] The post How to Add Inline Comments for Multi-line Command in Bash Script is from SysTutorials. How to Match Multiple Lines using Regex in Perl One-linersHow to Match Multiple Lines using Regex in Perl One-linersPerl one-liners with perl’s regular expression statement can be a very powerful text processing tools used as commands in a terminal or a script. By default, the input to the perl one-liner with -p or -n options is passed line by line. However, when we want to match multiple lines, it gets us some trouble. […] The post How to Match Multiple Lines using Regex in Perl One-liners is from SysTutorials. How to Query Transaction By ID in Hyperledger Fabric 2.0How to Query Transaction By ID in Hyperledger Fabric 2.0Querying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related […] The post How to Query Transaction By ID in Hyperledger Fabric 2.0 is from SysTutorials. Blockchain Platforms Introduced, Each in One SentenceBlockchain Platforms Introduced, Each in One SentenceThis post lists some general- and special-purpose blockchains nowadays available with a short description in one sentence. Readers can have a quick understanding of what a blockchain network is built for and what uniqueness that blockchain has. I also give links to beginner friendly resources as learn materials. General purpose blockchains Blockchains for general purpose […] The post Blockchain Platforms Introduced, Each in One Sentence is from SysTutorials. How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04Hyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will […] The post How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04 is from SysTutorials. How to Grep 2 Lines using grep in Linux?How to Grep 2 Lines using grep in Linux?grep is excellent to match patterns from STDOUT/text files in command line or scripts. It’s handy. Sometimes, our problem is more complex than finding a keyword from a file. On a first thought, it may sound impossible using grep for such complex problems. But grep can be quite powerful than we thought. Today, let’s check […] The post How to Grep 2 Lines using grep in Linux? is from SysTutorials. How to Install Go 1.13.x on Ubuntu 18.04How to Install Go 1.13.x on Ubuntu 18.04In Ubuntu 18.04 LTS, the default Go lang version is 1.10. For compatibility reason, the Ubuntu LTS will usually keep the major release version numbers for packages. However, many applications, such as Hyperledger Fabric 2.0, require a newer version of Go. In this post, let’s take a look at how to install a system level […] The post How to Install Go 1.13.x on Ubuntu 18.04 is from SysTutorials. GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleGCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleWe know compilers like gcc can do lots smart optimization to make the program run faster. Regarding functions call optimization, gcc can do tail-call elimination to save the cost of allocating a new stack frame, and tail recursion elimination to turn a recursive function to non-recursive iterative one. gcc can even transform some recursive functions […] The post GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length Example is from SysTutorials. Dynamics 365 Developer Extension is Now Working in Visual Studio 2017Dynamics 365 Developer Extension is Now Working in Visual Studio 2017I don’t know why Jason Lattimer’s D365DeveloperExensions no more working after VS 2017 release? It seems D365DeveloperExtensions anymore supported for newer Visual Studio version. I am pretty much sure, some of you may be still struggling with installing Dynamics 355 Developer extension for your Visual Studio 2017 community or professional edition. Not sure why this tool has been […] The post Dynamics 365 Developer Extension is Now Working in Visual Studio 2017 is from SysTutorials. Bash Learning MaterialsBash Learning MaterialsBash (GNU Bourne-Again SHell) the default shell for many Linux distributions. It is very common for scripting languages in Linux. Bash is easy and straightforward for writing small tools. However, as most tools, it has its grammars that could easily cause bugs if they are not used correctly. Here I summarize a list of good […] The post Bash Learning Materials is from SysTutorials. How to Install Wine 32-bit on CentOS 8How to Install Wine 32-bit on CentOS 8Since version 7, RHEL and CentOS only have 64 bit versions. For some reasons, it’s better to run many Windows applications under 32 bit wine. Like How to Install Wine 32-bit on CentOS 7, this post introduce how to install 32-bit Wine on CentOS 8. Most of the mechanisms are similar yet there are differences. […] The post How to Install Wine 32-bit on CentOS 8 is from SysTutorials. How to Convert Integers to Strings and Strings to Integers in PHPHow to Convert Integers to Strings and Strings to Integers in PHPConversion from integer to string and from string to integer are common operations in most applications such as C++. PHP has its uniqueness in language and standard library design. In this post, we will check methods to convert integers to strings and vice versa. Convert string to int in PHP You can cast a string […] The post How to Convert Integers to Strings and Strings to Integers in PHP is from SysTutorials. How to list and start VirtualBox VMs in command line in Linux?How to list and start VirtualBox VMs in command line in Linux?VirtualBox is a nice open source virtual machine software. It works nicely on Linux and is supported by many Linux distros like Ubuntu in their official package repositories, so it is quite easy to set it up on Linux. The VMs can also be managed in command line using the vboxmanage command line tool provided […] The post How to list and start VirtualBox VMs in command line in Linux? is from SysTutorials. A StoneWall Solution in C++A StoneWall Solution in C++StoneWall is an interesting problem that requires some brain cycles yet not too complex. It is good software engineer interview question. Here is a C++ solution whose complexity is O(N). #include <stack> int solution(std::vector<int> &H) { int stones = 0; std::stack<int> heights; for (auto h: H) { while (!heights.empty() && h < heights.top()) { heights.pop(); […] The post A StoneWall Solution in C++ is from SysTutorials. How to add Gmail SMTP in ThunderbirdHow to add Gmail SMTP in ThunderbirdGmail’s authentication is secured by rejecting access from less secure apps. By default, adding Gmail SMTP in Thunderbird with your Google account password as SMTP authentication password will not work. And Google is beginning to shut off Google Account access to less secure apps. To solve this, the method is to use OAuth2 authentication instead […] The post How to add Gmail SMTP in Thunderbird is from SysTutorials. How to synchronize OneDrive and OneDrive for Business files in Linux using InsyncHow to synchronize OneDrive and OneDrive for Business files in Linux using InsyncOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software […] The post How to synchronize OneDrive and OneDrive for Business files in Linux using Insync is from SysTutorials. How to list all commits in a git repositoryHow to list all commits in a git repository`git log` only list all the commits in the current working branch. For some cases, we may want to list all the commits in a git repository. The `git log` command does not do this. But there are other supports in `git` that can do so. The command to list all commits is git rev-list […] The post How to list all commits in a git repository is from SysTutorials. How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux? To generate an RSA private key: openssl genrsa -out private.pem 2048 To generate the RSA public key from the RSA private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem The post How to generate a pair of RSA private and public key in Linux? is from SysTutorials. How to encrypt a file using openssl on Linux non-interactively?How to encrypt a file using openssl on Linux non-interactively?How to encrypt a file using openssl on Linux non-interactively? The passphrase shall be provied to openssl in a programmatic way instead of requesting the user to input it, so that the command may work in a regular cron job or some batch jobs. To encrypt file file.tgz and store it to file.tgz using aes-256-ebc […] The post How to encrypt a file using openssl on Linux non-interactively? is from SysTutorials. Xen: VM failed to bootXen: VM failed to bootQuestion: Hello, I am using Xen on Centos 7 and it was working fine from last 3 years. After I reboot the VM I am getting below error: "dracut-initqueue[270]: Warning: dracut-initqueue timeout - starting timeout scripts" "[ 195.426203] dracut-initqueue[270]: Warning: Could not boot. [ 195.435712] dracut-initqueue[270]: Warning: /dev/centos_static/root does not exist [ 195.436499] dracut-initqueue[270]: Warning: […] The post Xen: VM failed to boot is from SysTutorials.

How to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkHow to create a Java chaincode and deploy in a Hyperledger Fabric 2 networkIntroductionContinue reading on Coinmonks »Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…Dockerising(Containerising) Caliper and Integrate with your own Hyperledger Fabric Network…An Implementation of a REST API to your custom Network with ExpressJS & Node.jsAn Implementation of a REST API to your custom Network with ExpressJS & Node.jsCreate a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Create a Custom Network and Deploy your own Chaincode with Hyperledger Fabric v2.1Hyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkHyperledger Fabric v2.1 Installation Guide — Prerequisites & Bring up the Test NetworkThe Chaincode Lifecycle on Hyperledger Fabric v2The Chaincode Lifecycle on Hyperledger Fabric v2Creating a Hyperledger Fabric 2 network template in four simples stepsCreating a Hyperledger Fabric 2 network template in four simples stepsIntroductionContinue reading on Coinmonks »On The State Of Adoption In Decentralised FinanceOn The State Of Adoption In Decentralised FinanceSetting Up Hyperledger Besu On Amazon Web Services Using IBFT2Setting Up Hyperledger Besu On Amazon Web Services Using IBFT2

Zcash’s First Halving May Solve Its Inflation ProblemZcash’s First Halving May Solve Its Inflation ProblemZcash (ZEC) is due for its first mining reward halving later this year. The event could solve a major problem for the privacy-focused cryptocurrency.Craig Wright Called ‘Fraud’ in Message Signed With Bitcoin Addresses He Claims to OwnCraig Wright Called ‘Fraud’ in Message Signed With Bitcoin Addresses He Claims to OwnBitcoin keys from coins Wright claims to own were used to sign a message calling him a "fraud." As Bitcoin Falls to 2-Week Lows, Small Investors Look to Be BuyingAs Bitcoin Falls to 2-Week Lows, Small Investors Look to Be BuyingWhile bitcoin is losing altitude, small investors look to be gaining exposure to the top cryptocurrency, data suggests.Telegram Quits Court Fight With SEC Over TON Blockchain ProjectTelegram Quits Court Fight With SEC Over TON Blockchain ProjectTelegram has thrown in the towel in its court battle against the U.S. Securities and Exchange Commission (SEC) and will no longer be appealing the ban on its blockchain token project.Binance CEO Says Steem Too Centralized but Exchange Must Support Controversial Hard ForkBinance CEO Says Steem Too Centralized but Exchange Must Support Controversial Hard ForkBinance is forced to "technically" support last week's hard fork of the Steem blockchain, according to the exchange's CEO, Changpeng Zhao.Crypto Long & Short: Innovation Cycles, Crypto Venture Funds and Institutional InvestorsCrypto Long & Short: Innovation Cycles, Crypto Venture Funds and Institutional InvestorsWith so much attention on institutional involvement in crypto asset markets, we overlook that they are already here through VC investments – less fast-paced, perhaps, but important to keep an eye on for what they reveal about cycles.Spiritual Reflections on the Bitcoin HalvingSpiritual Reflections on the Bitcoin HalvingThe Bitcoin halving was like New Year's Eve with no time differences and everyone committed to a nonviolent revolution against financial tyranny. Central Bank Digital Currencies Need DecentralizationCentral Bank Digital Currencies Need DecentralizationTo reap the full benefits of digital currencies, central bankers need to consider decentralizing some authority, say the authors of a new report. The Shadow of Satoshi’s Ghost: Why Bitcoin Mythology MattersThe Shadow of Satoshi’s Ghost: Why Bitcoin Mythology MattersHow the myth-making around Satoshi reinforces what makes bitcoin unique in the landscape of global monies.Louisiana State Senate to Consider Crypto Business Licensing BillLouisiana State Senate to Consider Crypto Business Licensing BillThe Louisiana State House of Representatives passed a bill on Wednesday to regulate and license virtual currency businesses. A Senate committee will now evaluate the proposal.Blockchain Bites: Iran and Russia Revisit Crypto Regulations, Bitcoin Pizza Day 10 Years LaterBlockchain Bites: Iran and Russia Revisit Crypto Regulations, Bitcoin Pizza Day 10 Years LaterTen years ago today someone spent 10,000 bitcoin on about $30 worth of pizza. Today, nations are redrafting crypto regulation and crypto firms report millions in revenues. Money Reimagined: Designer Money for a Machine-Run Post-COVID WorldMoney Reimagined: Designer Money for a Machine-Run Post-COVID WorldThe pandemic is likely to accelerate a shift to automation, putting people out of work and raising the need for new types of money. Binance, Eosfinex Join EOSDT Stablecoin Governance BoardBinance, Eosfinex Join EOSDT Stablecoin Governance BoardBinance and eosfinex are joining the oversight team for Equilibrium, the decentralized finance group behind the EOSDT stablecoin.10 Years After Laszlo Hanyecz Bought Pizza With 10K Bitcoin, He Has No Regrets10 Years After Laszlo Hanyecz Bought Pizza With 10K Bitcoin, He Has No RegretsLaszo Hanyecz's 10,000 BTC pizza buy 10 years ago has a special place in bitcoin folklore, highlighting, however expensively, that participation is necessary for network success. Fed Up With Its Fork of Stellar, Kin Is Looking to Move Onto SolanaFed Up With Its Fork of Stellar, Kin Is Looking to Move Onto SolanaThe Kin Foundation is seeking to move the kin cryptocurrency onto the Solana blockchain, according to a proposal shared with CoinDesk.RenBTC Quietly Goes Live in Latest Bid to Bring Bitcoin to EthereumRenBTC Quietly Goes Live in Latest Bid to Bring Bitcoin to EthereumRenBTC, the latest implementation of bitcoin on the Ethereum blockchain, quietly went live this week, though the general public can't yet mint thier own tokens.Canaan Reports $5.6M Loss in Q1 Despite Bitcoin Miner Price CutCanaan Reports $5.6M Loss in Q1 Despite Bitcoin Miner Price CutThe China-based manufacturer had cut the pricing for its bitcoin miners by half during the first three months.Colombia, Deloitte, ConsenSys Sign On to WEF’s ‘Blockchain Bill of Rights’Colombia, Deloitte, ConsenSys Sign On to WEF’s ‘Blockchain Bill of Rights’The cryptocurrency industry just gained an organized structure for collaborating with world leaders, thanks to the World Economic Forum.Iranian President Calls for National Crypto Mining StrategyIranian President Calls for National Crypto Mining StrategyIran's President has ordered officials to develop a new approach to cryptocurrency mining.Market Wrap: Traders ‘Buy the Dip’ as Bitcoin Hovers at $9,000Market Wrap: Traders ‘Buy the Dip’ as Bitcoin Hovers at $9,000Bitcoin fell for a second day as sentiment grew bearish, though some traders say they’ll buy the dip.

How to build a dapp on a private Ethereum network : Part — 4How to build a dapp on a private Ethereum network : Part — 4Five 3Commas Alternatives in the United States — 2020Five 3Commas Alternatives in the United States — 2020What’s the best crypto trading bot in 2020? — Top 8 Bitcoin Trading BotWhat’s the best crypto trading bot in 2020? — Top 8 Bitcoin Trading BotEthereum Interview Questions — Part 1Ethereum Interview Questions — Part 1Sharding: The brain of Ethereum 2.0Sharding: The brain of Ethereum 2.0Beacon Chain: Heart of Ethereum 2.0Beacon Chain: Heart of Ethereum 2.0How to Generate Random Numbers on Ethereum Using VRFHow to Generate Random Numbers on Ethereum Using VRFHow Chainlink Solved Ethereum’s “Random Problem”Continue reading on Coinmonks »Crypto Deals, Reddit’s Token Launch, 20K Subscribers…Crypto Deals, Reddit’s Token Launch, 20K Subscribers…The oracle problemThe oracle problemOur connection to the physical worldContinue reading on Coinmonks »Ethereum 2.0: What to expectEthereum 2.0: What to expect

Top-Down SIEM: An Interview with Avi Chesla of EmpowTop-Down SIEM: An Interview with Avi Chesla of EmpowEnterprises still struggle to understand the implications and proper deployment of SIEM. In fact, of all the branches of modern cybersecurity, SIEM often poses the most challenges. However, the advent of top-down SIEM could change all of that. To find out more, we spoke with Avi Chesla of empow in an in-depth interview which covered […] The post Top-Down SIEM: An Interview with Avi Chesla of Empow appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees”Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees”Securonix today released the Securonix 2020 Insider Threat Report. This report analyzed more than 300 confirmed incidents to find significant patterns in insider threats. Among its key findings, Securonix analyzed the risks associated with “flight-risk” individuals.  Securonix positions itself as a next-generation SIEM and user and entity behavior analytics (UEBA) solution provider. Moreover, it features […] The post Securonix 2020 Insider Threat Report Warns of “Flight-Risk Employees” appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Focusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empowFocusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empowBy Haim Zlatokrilov, VP of Products at empow As the world goes through the worst health crisis in a century, and the first one occurring in the digital age, we are learning on the go. One of the only ways we can learn is to analyze how different countries with different approaches have dealt with […] The post Focusing on the Entity – A Lesson for Cyber Security from the Coronavirus by empow appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19Tripwire today announced the results of a survey conducted by Dimensional Research exploring cybersecurity concerns during the COVID-19 crisis. Dimensional Research conducted the survey over April 14 through April 21, 2020, which includes responses from 345 IT security professionals.  Tripwire is a cybersecurity provider specializing in security and compliance automation. It works to protect the […] The post Tripwire & Dimensional Research Uncover Cybersecurity Concerns Amidst COVID-19 appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Will SOAR Cybersecurity Replace SIEM in the Near Future?Will SOAR Cybersecurity Replace SIEM in the Near Future?Will SOAR (security orchestration, automation, and response) once day replace Security Information and Event Management (SIEM)? If so, why would SOAR replace SIEM? Have the lines between the two solutions blurred, and if so how?  After all, SIEM now features some automation and response capabilities. Either through innovation or acquisition, SIEM solutions often boast SOAR […] The post Will SOAR Cybersecurity Replace SIEM in the Near Future? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. FireEye and Mandiant Security Validation Find Limited Cybersecurity EffectivenessFireEye and Mandiant Security Validation Find Limited Cybersecurity EffectivenessFireEye, via the Mandiant Security Validation (formerly Verodin) team, released the Mandiant Security Effectiveness Report 2020. This report reveals how well businesses protect themselves against cyber threats and the overall effectiveness of their security infrastructure. The data comes from thousands of tests performed by the team which simulated real attacks and malicious behaviors; the Mandiant […] The post FireEye and Mandiant Security Validation Find Limited Cybersecurity Effectiveness appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Solutions Review: The Eight Niche Players in SIEM, 2020Solutions Review: The Eight Niche Players in SIEM, 2020These providers have recently been named Niche Players in SIEM in 2020 by analyst house Gartner, Inc.  Gartner defines SIEM by “customers’ need to analyze security event data in real-time, which supports the early detection of attacks and breaches. SIEM systems collect, store, investigate, support mitigation and report on security data for incident response, forensics […] The post Solutions Review: The Eight Niche Players in SIEM, 2020 appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Rapid7 Announces Plan to Acquire DivvyCloud for Cloud SecurityRapid7 Announces Plan to Acquire DivvyCloud for Cloud SecurityRecently, Rapid7 announced its plans to acquire DivvyCloud. DivvyCloud operates as a cloud security and governance solution provider. Rapid7 plans to purchase DivvyCloud for $145 million in cash and stock. The deal should close sometime this quarter, pending regulatory approval.  Rapid7 offers an extensive cybersecurity portfolio for businesses, including user analytics behavior analytics, SIEM, SOAR, […] The post Rapid7 Announces Plan to Acquire DivvyCloud for Cloud Security appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Why You Need Both SIEM and SOAR Solutions in your CybersecurityWhy You Need Both SIEM and SOAR Solutions in your CybersecurityWhen making cybersecurity decisions, most enterprises want the most streamlined offering. When possible, they want just one solution; after all, deploying more solutions could cause integration issues as well as run up costs. However, you need both SIEM and SOAR in your cybersecurity portfolio. We explore why below.  Why Do You Need SIEM?  Before we […] The post Why You Need Both SIEM and SOAR Solutions in your Cybersecurity appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Cygilant Announces New Cygilant Endpoint Security SolutionCygilant Announces New Cygilant Endpoint Security SolutionCygilant today announced a new solution in its cybersecurity portfolio. This new solution, Cygilant Endpoint Security, aims to provide greater visibility into suspicious activity taking place on network endpoints. Also, it works with Cygilant’s alert system and monitored solution offerings.   Cygilant helps mid-sized enterprises through automated cybersecurity solutions and managed detection and response (MDR). It […] The post Cygilant Announces New Cygilant Endpoint Security Solution appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)How to overcome the top challenges of achieving identity resolution How to overcome the top challenges of achieving identity resolution No matter the enterprise industry, common business practices today require personalization at scale, in terms of both volume and speed of resolution, with identity resolution at the core. Identity resolution consists of combining what is already known about individuals through personally identifiable information (PII) such as email, mailing address, birthday, home and mobile phone numbers, or other first-party identifiers, with data that marketers can purchase from a third-party to know more about the individuals, and information that marketers still need directly from individuals to complete a profile. This is an important element of establishing a competitive advantage in any industry as identity resolution allows for improved personalization, omnichannel orchestration, and real-time engagement that leads to increased customer retention, loyalty, and ultimately revenue growth.To read this article in full, please click hereFlex strengthens supply chain with IAMFlex strengthens supply chain with IAMCompanies that depend on vast supply chains to produce their wares tend to work with hundreds or even thousands of partners, many of which require an online portal — or several — with which to share information. Flex, the $26 billion supply chain technology company formerly known as Flextronics, is no exception.To read this article in full, please click here(Insider Story)