Cluster computing

Monday, February 19, 2018

›
Fingerprint readers are returning: We were discussing identity management without login screens. We elaborated on the following three com...
Sunday, February 18, 2018

›
We were discussing identity management without login screens. We elaborated on the following three components as necessary for the alterna...
Saturday, February 17, 2018

›
We were discussing identity management without login screens. If we can persist a token/passcode/password/private-keys/HTTP-Links for the ...
Friday, February 16, 2018

›
We were discussing identity management without login screens. If we can persist a token/passcode/password/private-keys/HTTP-Links for the ...
Thursday, February 15, 2018

›
We were discussing Remme and its use of blockchain for distributed identity management. Blockchain is a ledger that the public can use to ...
Wednesday, February 14, 2018

›
Blockchain Technology has been used to decentralize Security and proves to be great for identity management. A blockchain is a continuously...
Tuesday, February 13, 2018

›
We were looking at some of the search queries that are collected from the community of those using  logs from an identity provider: We w...
‹
›
Home
View web version

About Me

My photo
Ravi Rajamani
View my complete profile
Powered by Blogger.