Remove Airlines Remove Applications Remove Authentication Remove Network
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Understanding the business of the airline industry As previously mentioned, the revenue streams are becoming diversified in the airline sector.

article thumbnail

Zero Trust with Zero Data

Phil Windley

In a world where network boundaries are increasingly porous and cyber threats are more evasive than ever, the Zero Trust model centers around the notion that no one, whether internal or external, should be inherently trusted. far fewer federations) and enable applications that have far greater scale.

Data 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

The hope is that these new analog chips will use dramatically less power making them useful for any of the mobile and distributed applications on machines that aren’t always plugged in. Chance of succeeding: The success or failure will probably be governed by the nature of the applications.

Tools 138
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. This metasystem is in effect a system of systems that exposes a unified interface much like a device driver or network socket does. Identity Systems.

System 87
article thumbnail

VMworld 2014 Day 2 Keynote

Scott Lowe

Poonen uses an example of a rooftop infinity pool in Singapore as a metaphor for the “three foundations” of EUC: SDDC, workspace services (authentication and content collaboration, for example), and then the desktop/mobile/cloud experience. Horizon delivers a unified application publishing and VDI solution.

Vmware 65
article thumbnail

Generative Identity

Phil Windley

The Generative Self-Sovereign Internet explored the generative properties of the self-sovereign internet, a secure overlay network created by DID connections. She might also use it at partner websites (like the benefits provider) to provide shared authentication without federation (and it's associated infrastructure). Purchase orders.

article thumbnail

The Laws of Identity

Phil Windley

The Internet was a network of machines and all the identity in Internet protocols is designed to identify machines and services. Rather, Sovrin is a set of protocols and a network that allows multiple identity providers to provide identity credentials to anyone for any purpose. This is an excellent description of Sovrin.

Banking 88