Driver's Licence - Issued to Archibald Gordon Maclaurin, Essex County Council, 4 Mar 1927

Part 3 – The Future of CIAM

Harnessing the Power of Verifiable Credentials Welcome to Part 3 of our guide to Modern Consumer Identity and Access Management (CIAM) Platform! In this installment, we’ll be discussing the use cases and industries impacted by decentralized identity and verifiable credentials. Decentralized identity and verifiable credentials have become hot topics in the tech world as they […]

Part 3 – The Future of CIAM Read More »

What are the various privacy laws around the world

Privacy laws are legal frameworks that regulate the collection, use, and disclosure of personal information by organizations. The purpose of these laws is to protect individuals’ privacy and personal data from misuse, abuse, or unauthorized access. Privacy laws can take various forms, including federal, state, or local laws, as well as industry-specific regulations. Some of

What are the various privacy laws around the world Read More »

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification – Part 2

As digital transactions become more ubiquitous, the need for secure and efficient identity onboarding and verification is more important than ever. Decentralized identity and verifiable credentials are two emerging technologies that have the potential to revolutionize the way we think about digital identity. In this article, we will discuss how decentralized identity and verifiable credentials

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification – Part 2 Read More »

A Guide to Modern Customer Identity and Access Management (CIAM) – Part 1

As we move forward into the 21st century, we are experiencing an inflection point with customer identity and access management (CIAM) systems. The way we think about identity and access management has evolved considerably over the years. In the past, it was just about ensuring security, but now it is also about making the customer

A Guide to Modern Customer Identity and Access Management (CIAM) – Part 1 Read More »

computer c code

How to develop and expose APIs using Go

With the help of just a few additional packages I am able to quickly create a base set of APIs. I’ll go through the core aspects of this as well as include a video walk-through. This application is pretty simple with a MySQL database backend and a Go application as the middle-layer. In the attached video I step through how I setup the database and the go source code to create a set of APIs to interact with the MySQL backend.

How to develop and expose APIs using Go Read More »

Scroll to Top