
Assessing Blockchain Platforms
by Homan Farahmand | April 11, 2019
What constitutes a blockchain platform, its design goals, and how that should be assessed have been a source of passionate debate among experts. This can be confusing for technical professionals...

Training versus Inference
by Paul Debeasi | February 14, 2019
Few data-driven technologies provide greater opportunity to derive value from Internet of Things (IoT) initiatives as machine learning. The accelerated growth of data captured from the sensors in IoT solutions...

Machine Learning Integration Options
by Paul Debeasi | January 30, 2019
Machine learning projects are inherently different from traditional IT projects in that they are significantly more heuristic and experimental, requiring skills spanning multiple domains, including statistical analysis, data analysis and...

Architect Machine Learning with IoT
by Paul Debeasi | January 25, 2019
Developers with no data science experience are now able to integrate Machine Learning (ML) with IoT. As the number of IoT endpoints proliferate, the need for organizations to understand how...

Security Architecture Frameworks - Yay or Nay?
by Anton Chuvakin | October 24, 2018
This post is about a topic that few of us ponder often: security architecture frameworks. We have some exciting research plans in this area, hence this blog series.
Perhaps one...

In 2018, What Is Security Architecture?
by Anton Chuvakin | August 31, 2018
Summer is a less busy time here in terms of client calls [hey … you can book an analyst call for tomorrow … even with me :-)], so we get...

Decentralized Identity Hard Work Begins
by Homan Farahmand | February 15, 2018
Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Robotic Process Automation Knocking on IAM Door!
by Homan Farahmand | February 3, 2017
Manual and tedious identity governance and administration tasks can bring chills to many IT leaders when it comes to planning resources in a budget cycle. It is almost an accepted...

Testing Your IAM Planning Decisions Needs a Robust Risk Model
by Homan Farahmand | April 27, 2016
IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Chasing the Long Tail of Fine-grained Authorization
by Homan Farahmand | February 9, 2016
Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...