Email Trust 2.5: Decentralization is KeyWhy every email must be digitally signed using a Self-Sovereign Identity (SSI)Nov 22, 2023Nov 22, 2023
Ensuring Traceability and AccountabilityThe Vital Role of Decentralized Digital Identity in the Age of Generative AIAug 1, 2023Aug 1, 2023
IoT and Trusted Location Services“On the Internet, nobody knows you’re a dog” is an adage and Internet meme about Internet anonymity which began as a caption to a cartoon…Apr 25, 2023Apr 25, 2023
Building Data Center Interconnects Across Service ProvidersTo make the most of network infrastructure, a carrier must be able to lease it to customers. But how? Read to learn more!Apr 4, 2023Apr 4, 2023
Blockchain for Auto InsuranceWhen used properly, Blockchain technology offers improved security and trust for auto insurance through decentralization and verifiable…Mar 14, 2023Mar 14, 2023
Service Level Agreements, Trust, and the ITN (or Give it a DID!)How does the ITN address trusted identities for virtal resources? Read to learn more!Feb 14, 2023Feb 14, 2023
Finding Your Thing On the Blockchain: IoT in the Age of Standardized Global IdentifiersIn our previous blog post, we talked about the example of surveillance cameras in the world of IoT, and how they can use Self-Sovereign…Jan 2, 2023Jan 2, 2023
When Things Know What They Are: IoT in the Age of Self-Sovereign IdentityWith approximately 15 billion connected Things either consuming or providing digital services every second of every day, every Chief…Dec 19, 2022Dec 19, 2022
The Digital Business Trilemma, Zero Trust, and the ITNThe future of digital business is at a crossroads.Dec 5, 2022Dec 5, 2022