Making the case for separating Identity from Access Management. Just because an industry coins a phrase, it does not follow that the assumptions behind that phrase remain valid over time. Case in point: Identity and Access Management (#IAM).
Don’t get hypnotized by the apparent complexity of Roles, Policies, Attributes and so on. Access Control is a pretty basic concept. Here are five examples of access control most people know and understand from regular daily life.
Impact Investing, Effective Altruism, Triple Bottom Line… we’ve gotten smarter about social enterprise but we can become smarter still. #3bl #tbl #triplebottomline #socialentrepeneurs #socialenterprise #effectivealtruism #impactinvesting #startups #MenorcaDecelerator18
Customer Relationship Management (CRM) software has particular access-control requirements. This article looks at access-control use cases for CRM, and describes how they are different from those of other SaaS solutions.
We’ve been hypnotized by buzzwords (again). APIs, Microservices, Deep Learning, Blockchain… at the two extremes of any value chain, it’s still by people for people. Software As A Service? Hah! Software *is* a service. And it always has been.
We’ve developed a simple logger library, Logjack, on top of log4js-node that writes XML and JSON, and includes a REST API. We have released it as open source under an Apache 2.0 license and posted it to GitHub.