Posted on Leave a comment

Blockchain: Fortifying Identity, Finance, and Privacy

The Power of Blockchain Technology

Blockchain technology has emerged as a game-changer in the digital landscape, transforming the way we manage identity, finance, and privacy. At its core, blockchain is a decentralized, immutable, and transparent ledger that enables secure and instant transactions without the need for intermediaries or centralized authorities. This revolutionary technology has the potential to disrupt traditional industries, boost innovation, and empower individuals and communities.

In this article, we will explore how blockchain is fortifying identity, finance, and privacy, and its real-world applications, challenges, and future prospects. We will also discuss the legal, cybersecurity, and social impact implications of blockchain, and how it can contribute to a more equitable and sustainable world.

Blockchain and Identity: A New Era of Digital Identity Management

Identity is a fundamental aspect of our lives, both online and offline. However, traditional identity management systems are often fragmented, insecure, and vulnerable to data breaches and identity theft. Blockchain offers a new paradigm for digital identity management, based on decentralized and self-sovereign identity (SSI) principles.

SSI allows individuals to own, control, and share their identity information securely and selectively, without relying on third-party intermediaries or central authorities. By using blockchain-based identity solutions, individuals can authenticate themselves seamlessly, access services and resources, and protect their privacy and security.

For instance, the Sovrin Network provides a decentralized identity infrastructure that enables trusted and verifiable digital identities, based on open standards and interoperability. Other blockchain-based identity platforms include uPort, Civic, and SelfKey, which offer similar features and benefits.

Blockchain and Finance: Towards a More Transparent and Secure Financial System

Finance is another area where blockchain is making significant strides, by enabling more transparent, efficient, and secure transactions. Blockchain-based finance, also known as decentralized finance (DeFi), is a rapidly growing ecosystem that offers a range of financial services, such as lending, borrowing, trading, and investing, without relying on traditional intermediaries or centralized authorities.

DeFi leverages blockchain’s features, such as smart contracts, tokenization, and interoperability, to provide more accessible and inclusive financial services, especially for underserved and unbanked populations. For example, stablecoins, which are blockchain-based digital currencies pegged to traditional assets, can provide a stable store of value and a more reliable means of exchange, especially in volatile markets.

Other DeFi applications include decentralized exchanges (DEXs), which allow peer-to-peer trading of digital assets without intermediaries, and yield farming, which enables users to earn interest on their crypto holdings by providing liquidity to DeFi protocols. However, DeFi is not without risks, such as smart contract vulnerabilities, liquidity issues, and regulatory challenges.

Blockchain and Privacy: Protecting Personal Data in a Decentralized World

Privacy is a critical aspect of digital life, as it enables individuals to control their personal information and prevent unauthorized access, misuse, or exploitation. However, traditional privacy solutions, such as centralized databases or encryption, have limitations and vulnerabilities that can be exploited by cybercriminals or surveillance agencies.

Blockchain offers a new approach to privacy, based on cryptographic techniques and distributed storage. By using blockchain-based privacy solutions, individuals can protect their data from unauthorized access, maintain anonymity, and ensure data integrity and immutability.

For example, zero-knowledge proofs (ZKPs) are cryptographic protocols that enable parties to prove the validity of a statement without revealing any additional information. ZKPs can be used to authenticate identities, verify transactions, and protect sensitive data without compromising privacy.

Other blockchain-based privacy solutions include homomorphic encryption, ring signatures, and multi-party computation, which offer different levels of privacy and security. However, privacy is not absolute, and there are trade-offs between privacy, usability, and scalability.

How Blockchain Works: The Fundamentals of Distributed Ledgers and Cryptography

To understand how blockchain works, we need to delve into its fundamental principles and components. At its core, blockchain is a distributed ledger that maintains a record of transactions, verified by a network of nodes, without the need for trust or intermediaries.

Each block in the blockchain contains a cryptographic hash of the previous block, creating an immutable and tamper-evident chain of blocks. Transactions are validated and added to the blockchain through consensus mechanisms, such as proof-of-work (PoW) or proof-of-stake (PoS), which incentivize nodes to contribute computing power and verify transactions.

Blockchain also relies on various cryptographic techniques, such as public-key cryptography, hash functions, and digital signatures, to ensure data confidentiality, integrity, and authenticity. These techniques enable secure and transparent transactions, without revealing sensitive information or compromising privacy.

Blockchain technology is not limited to cryptocurrency transactions, but can also be applied to various use cases, such as supply chain management, voting systems, and intellectual property management.

Blockchain Use Cases: Real-World Examples of Blockchain Applications

Blockchain has already demonstrated its potential to transform various industries and domains, from finance and identity to healthcare and energy. Some notable blockchain use cases include:

  • Supply chain management: Blockchain can provide end-to-end visibility and traceability of products, from raw materials to distribution, ensuring authenticity, quality, and compliance.
  • Healthcare: Blockchain can enable secure and interoperable sharing of patient data, as well as tracking of medical supplies and drugs, reducing errors, fraud, and inefficiencies.
  • Energy: Blockchain can facilitate peer-to-peer energy trading, renewable energy certificates, and carbon credits, enabling more sustainable and decentralized energy systems.
  • Gaming: Blockchain can enable secure and transparent ownership, transfer, and trading of in-game assets, as well as provably fair gaming outcomes, enhancing player experience and trust.

These are just a few examples of how blockchain is disrupting traditional industries and enabling new business models and opportunities.

Blockchain Challenges: Overcoming Scalability, Interoperability, and Adoption Hurdles

Despite its potential and benefits, blockchain also faces various challenges and limitations that hinder its widespread adoption and scalability. Some of these challenges include:

  • Scalability: Blockchain’s limited processing power and storage capacity can limit its throughput and transaction speed, especially for large-scale applications.
  • Interoperability: Blockchain’s fragmentation and lack of standardization can hinder its compatibility and integration with other systems and platforms, causing data silos and inefficiencies.
  • Adoption: Blockchain’s complexity and unfamiliarity can deter users and organizations from adopting it, especially in regulated industries or conservative environments.

To overcome these challenges, blockchain developers and researchers are exploring various solutions, such as sharding, sidechains, and interoperability protocols, as well as user-friendly interfaces and educational resources.

The Future of Blockchain: Beyond Cryptocurrencies and Initial Coin Offerings

Blockchain is still at an early stage of development, and its potential is far from fully realized. In the future, blockchain is likely to evolve and expand beyond its current applications and use cases, enabling new forms of value creation, governance, and social impact.

Some possible future developments of blockchain technology include:

  • Decentralized autonomous organizations (DAOs): DAOs are organizations that operate on blockchain-based smart contracts and are governed by their members. DAOs can enable more transparent and democratic decision-making, as well as more efficient and resilient organizations.
  • Internet of Things (IoT): Blockchain can provide secure and decentralized communication and data sharing among IoT devices, enabling more efficient and trustworthy IoT applications, such as smart homes, cities, and factories.
  • Artificial intelligence (AI): Blockchain can enable more secure and transparent training, validation, and deployment of AI models, as well as more accountable and ethical AI systems.

These are just some of the potential future applications of blockchain technology, and the possibilities are limited only by our imagination and creativity.

Blockchain Regulation: Navigating the Legal Landscape of Digital Assets

Blockchain’s decentralized and borderless nature poses significant challenges for regulatory frameworks and compliance measures. However, blockchain also offers opportunities for more efficient and effective regulation, based on transparency, accountability, and innovation.

The regulation of blockchain and digital assets varies across countries and jurisdictions, reflecting different legal, cultural, and economic contexts. Some countries, such as Malta, Switzerland, and Singapore, have adopted blockchain-friendly regulatory frameworks and attracted blockchain startups and investments.

Other countries, such as China and India, have adopted more restrictive policies and regulations, limiting the growth of blockchain and digital assets. However, the global trend is towards more regulatory clarity and convergence, as blockchain becomes more mainstream and recognized as a legitimate technology and asset class.

Blockchain and Cybersecurity: Enhancing Data Protection and Threat Detection

Cybersecurity is a critical aspect of blockchain, as it enables secure and trustworthy transactions and protects users from various threats, such as hacking, phishing, and malware. However, blockchain itself is not immune to cybersecurity risks and vulnerabilities, such as 51% attacks, smart contract bugs, and social engineering.

To enhance blockchain cybersecurity, various measures and solutions are being developed and deployed, such as:

  • Multi-factor authentication: This requires multiple forms of authentication, such as passwords, biometrics, and tokens, to access blockchain accounts and wallets.
  • Cold storage: This refers to storing cryptocurrencies and assets offline, in physical devices or paper wallets, to reduce the risk of online attacks.
  • Anti-money laundering (AML) and know-your-customer (KYC) regulations: These require blockchain-based businesses and exchanges to verify the identity and source of funds of their users, to prevent money laundering and terrorism financing.
  • Cyber threat intelligence (CTI): This involves collecting and analyzing data on cyber threats and vulnerabilities, to proactively detect and prevent attacks on blockchain networks and applications.

Blockchain and Social Impact: Empowering Communities and Reducing Inequality

Blockchain has the potential to contribute to social impact and sustainability goals, by enabling more democratic, transparent, and inclusive systems and applications. Blockchain-based solutions can empower marginalized communities, reduce inequalities, and promote social innovation and entrepreneurship.

For example, blockchain can enable:

  • Financial inclusion: Blockchain-based financial services, such as microlending, can provide access to capital for underserved and unbanked populations, reducing poverty and inequality.
  • Digital
Posted on Leave a comment

Tokenizing Virtual Identity: Blockchain & AI’s Inevitable Impact

Tokenizing Virtual Identity

Tokenizing virtual identity is the latest buzzword in the world of technology. With the rise of blockchain and AI, the process of tokenizing virtual identity has become more feasible and efficient. In a world that is increasingly dependent on digital communication and transactions, virtual identity has become an essential aspect of our lives. From social media to online banking, virtual identity is crucial for individuals and organizations alike. This article explores the inevitable impact of blockchain and AI on tokenizing virtual identity.

What is Blockchain and AI?

To understand the role of blockchain and AI in tokenizing virtual identity, we need to first understand what these technologies are. Blockchain is a decentralized and distributed digital ledger that records transactions across multiple computers, allowing secure and transparent storage of data. AI, on the other hand, refers to the simulation of human intelligence in machines that can perform tasks that typically require human cognition, such as learning, reasoning, and problem-solving.

The Benefits of Tokenizing Virtual Identity

Tokenizing virtual identity offers several benefits. Firstly, it provides a higher degree of security than traditional identity management systems, as it is based on cryptography and decentralized storage. Secondly, it offers greater control and ownership of personal data, allowing individuals to manage and monetize their identity. Thirdly, it offers greater efficiency by reducing the need for intermediaries and streamlining identity verification processes.

The Role of Blockchain in Tokenizing Identity

Blockchain plays a crucial role in tokenizing virtual identity. By providing a decentralized and secure platform for storing and managing identity data, blockchain ensures that personal data is owned and controlled by individuals, rather than centralized institutions. Blockchain also enables the creation of self-sovereign identities, where individuals have complete control over their identity data and can share it securely with trusted parties.

The Role of AI in Tokenizing Identity

AI plays a crucial role in tokenizing virtual identity by automating identity verification processes. By leveraging machine learning algorithms, AI can analyze large volumes of data and make intelligent decisions about identity verification. This can help reduce the risk of fraud and improve the efficiency of identity verification processes.

Tokenizing Virtual Identity: Use Cases

Tokenizing virtual identity has several use cases. For example, it can be used for secure and decentralized voting systems, where individuals can verify their identity and cast their vote securely and anonymously. It can also be used for secure and decentralized identity verification for financial and healthcare services, reducing the risk of identity theft and fraud.

Tokenizing Virtual Identity: Challenges

Tokenizing virtual identity also presents several challenges. One of the main challenges is interoperability, as different blockchain networks and AI systems may not be compatible with each other. Another challenge is scalability, as blockchain and AI systems may not be able to handle the volume of data required for identity verification on a large scale.

Security Concerns in Tokenizing Identity

Security is a key concern in tokenizing virtual identity. While blockchain and AI offer greater security than traditional identity management systems, they are not immune to attacks. Hackers could potentially exploit vulnerabilities in blockchain and AI systems to gain access to personal data. It is therefore crucial to implement robust security measures to protect personal data.

Privacy Issues in Tokenizing Identity

Privacy is another key concern in tokenizing virtual identity. While tokenizing virtual identity offers greater control and ownership of personal data, it also raises concerns about data privacy. It is essential to ensure that personal data is not shared without consent and that individuals have the right to access, modify, and delete their data.

Legal Implications of Tokenizing Identity

Tokenizing virtual identity also has legal implications. As personal data becomes more valuable, it is crucial to ensure that there are adequate laws and regulations in place to protect personal data. It is also essential to ensure that individuals have the right to access and control their data, and that they are not discriminated against based on their identity.

The Future of Tokenizing Virtual Identity

The future of tokenizing virtual identity looks bright. As blockchain and AI continue to evolve, we can expect to see more secure, efficient, and decentralized identity management systems. We can also expect to see more use cases for tokenizing virtual identity, from secure and anonymous voting systems to decentralized identity verification for financial and healthcare services.

Embracing Blockchain & AI for Identity Management

In conclusion, tokenizing virtual identity is an inevitable trend that will revolutionize the way we manage identity. By leveraging blockchain and AI, we can create more secure, efficient, and decentralized identity management systems that give individuals greater control and ownership of their personal data. While there are challenges and concerns associated with tokenizing virtual identity, these can be addressed through robust security measures, privacy protections, and adequate laws and regulations. As we continue to embrace blockchain and AI for identity management, we can look forward to a more secure, efficient, and decentralized future.

Posted on Leave a comment

What Is Distributed Identity? How Decentralized ID Works

Distributed digital identity, decentralized identity, blockchain, and distributed ledgers: what do they mean and how can they help keep my company secure?

What is a digital identity? A digital identity is information that combines all your personal online activities and data. Examples of what would make up your digital identity include usernames, passwords, online searches, date of birth, and social security number.

What Is the History of Digital Identity?

Digital identity is a critical and ever-present part of our lives. Identities play a role in almost every aspect of our lives, from business to commerce to entertainment. Additionally, many jurisdictions are turning to digital identity as civic documentation to cover identification purposes outside of the private sphere.

The history of digital identity has followed security, privacy, and usability questions, with different technologies attempting to address various aspects of these categories. One of the central challenges to digital identity has been centralization.

Centralization brings a host of problems to administrators, enterprises, and users alike:

  • Central Points of Failure: Centralized identity relies on central control over the implementation of that identity, which often means on-premise databases of login credentials (typically usernames and passwords or PINs). If that database is hacked, then those credentials are compromised and all user information has most likely been exposed.
  • Usability and Security Practices: Centralized identity schemes force organizations to either adopt outside identity management systems or implement their own—a reality that has led to a fragmentation of identity management. Users have to remember individual credentials for multiple systems, leading to poor security (from simple or reused passwords) and identity theft.
  • Lack of Ownership: The question of digital identity ownership is a lively one, with different regulations and business practices vying for control of private information. Centralized identity management requires that organizations mediate control between digital identities and users rather than placing ownership in the users’ hands.

Modern identity and access management have worked toward addressing some of these issues, primarily to support a connected, cloud-based, and secure digital world.

One of the emerging technologies to address these issues is single sign-on. The goal of SSO (also known as federated identity) is to facilitate authentication across multiple systems using a centralized repository of identities and policies.

Generally speaking, there are a few protocols through which SSO works:

Security Assertion Markup Language

SAML is an open markup language used by identity providers to format and transmit authorization credentials to other platforms or service providers. The idea is that a centralized SSO provider manages identities through a server and formats SAML authentication through an XML-based token system that connects identity providers and service providers (the organization handling your identities and the company with which you want to authenticate).

Open Authorization

As the name suggests, OAuth is more an authorization approach than an authentication method, but it can be used as part of an SSO scheme. Unlike SAML, where federation happens from a centralized identity provider across multiple service providers, it’s more often the case with OAuth that a user in an authorized session with one provider can access another provider from that session.

Of course, it bears stating that SSO is a smaller part of the larger discipline of IAM explicitly focused on how to provide federated identity and authentication without compromising security.

The problem with SSO and IAM, in general, is that they only address a small subset of issues with centralized SSO or OAuth. To start with, SSO systems still have security issues, and a compromised identity provider will still pose a risk to all users. Additionally, none of this addresses the issue of identity and data ownership.

To take steps in facing some of these lingering issues, developers and scientists are working toward developing distributed identities.

What Is Distributed Identity?

Distributed identity, also called decentralized identity, is the practice of truly removing the centralized nature of identity management from the equation.

Instead of creating localized or platform-specific usernames that rely on a single organization or consortium of participating organizations to manage, decentralization uses technology to place ownership of identity data into the hands of the users that information is supposed to represent.

How is this possible? The truth is that there isn’t a clear-cut answer yet but rather a collection of technologies that are stepping up to introduce decentralization into IAM as a whole:

  • Blockchain: Originally introduced in cryptocurrencies, like Bitcoin, as part of the nascent “Web 3.0,” the blockchain has been isolated as a uniquely powerful technology that provides an immutable, decentralized ledger of ownership. Under a blockchain, users have programs called wallets that store information and denote ownership, and this ownership is not dependent on a central organization to manage.
  • Decentralized Identifiers: Created by the World Wide Web Consortium, DID is a scheme of identity decentralization outside of blockchains proposed as a general protocol for managing identity. With DIDs, users can control their data, be protected by cryptography, and authenticate with participating organizations.

The blockchain, in particular, is part of what is currently being dubbed Web 3.0, emphasizing decentralization of control over information. It works by creating a ledger that the users of that network control through their participation, protected with cryptography.

Why Is Distributed Digital Identity So Important?

Right now, data ownership and protection are critical questions for large enterprises, governments, and end users alike. The General Data Protection Regulation is one of the most stringent privacy and security jurisdictions globally, due in no small part to its driving mission to place control of private data into the hands of consumers.

But giving users control over their digital identity and their personal data is no small task. Data is often seen as ephemeral, and users in many places (including the United States) have willingly given up control over their information to large corporations.

A distributed identity system could allow users to take control of their digital identities. Several governments have already begun to develop distributed forms of digital identities to support their citizens.

The European Union, for example, has started creating a self-sovereign identity framework built on DID and blockchain to modernize government ID for citizens. Countries like Germany, Uruguay, and Finland have started issuing electronic IDs and bank-issued eIDs to serve as national identification.

On a smaller scale, distributed identity can still benefit enterprises internally. By leveraging distributed identity systems, enterprises can connect user IDs with several different service platforms and authorization policies without reinventing or replacing existing identity systems. Additionally, enterprises can then adopt their schemes or extend existing ones offered through government agencies.

Strong Authentication and Distributed Identity with 1Kosmos

Distributed identity isn’t just a powerful new technology or the future of identification—it is a business imperative that will eventually shape how enterprise organizations integrate and adopt different types of managed services, cloud applications, and internal security measures. By working with user-owned, self-sovereign ID, businesses can mitigate some of the most significant weaknesses of centralized identity (security and usability) while expanding their ability to adapt and scale with new technologies.

BlockID from 1Kosmos provides secure authentication and promotes identity ownership through a few critical features:

  • Private and Permissioned Blockchain: 1Kosmos protects personally identifiable information in a private and permissioned blockchain and encrypts digital identities in secure enclaves only accessible through advanced biometric verification. Our ledger is immutable, secure, and private, so there are no databases to breach or honeypots for hackers to target.
  • Identity Proofing: BlockID includes Identity Assurance Level 2 (NIST 800-63A IAL2), detects fraudulent or duplicate identities, and establishes or reestablishes credential verification.
  • Streamlined User Experience: The distributed ledger makes it easier for users to onboard digital IDs. It’s as simple as installing the app, providing biometric information and any required identity proofing documents and entering any information required under ID creation. The blockchain allows these users more control over their digital identity while making authentication much easier.
  • Identity-Based Authentication: We push biometrics and authentication into a new “who you are” paradigm. BlockID uses biometrics to identify individuals, not devices, through identity credential triangulation and validation.
  • Interoperability: BlockID and its distributed ledger readily integrate with a standard-based API to operating systems, applications, and MFA infrastructure at AAL2. BlockID is also FIDO2 certified, protecting against attacks that attempt to circumvent multi-factor authentication.
  • Cloud-Native Architecture: Flexible and scalable cloud architecture makes it simple to build applications using our standard API, including private blockchains.

To discover the self-sovereign identity and BlockID, read more about 1Kosmos as a Distributed Digital Identity Solution. Also, make sure to sign up for the 1Kosmos newsletter to receive updates on 1Kosmos products and services.

Published
Author Robert MacDonald
Posted on Leave a comment

Born in the Cloud: The Next Generation of Cloud Services: New Approaches

KEY TAKEAWAYS

"Born in the cloud" is a new category of cloud services poised to make an impact on enterprises.

Born in the Cloud: The Next Generation of Cloud Services: New Approaches
Source: Filip323/Dreamstime.com

 

 

Years ago, we were talking about cloud native design as the lodestar for modern workload systems.

Now, we see the cloud as one more stepping stone toward even newer technologies that make data even more versatile and transferable.

Let's look at four of these and how they work, and how they intersect for the next generation, moving beyond the cloud age.

Distributed Cloud Solutions

With the evolution of peer to peer systems, the emergence of the Internet of Things, and the decentralization of the blockchain, cloud systems may be moving to a new place in a type of setup called "distributed cloud." Here a distributed peer to peer hardware framework runs services at the network edge, instead of in a centralized environment. This contributes to less latency and congestion on the network.

Like distributed computing, distributed cloud makes use of those individual hardware nodes that are 'out in the field.' Like the blockchain, it decentralizes certain types of control and management of system operations.

Virtualization

When we talked about no-hardware designs with "born in the cloud" systems nearly a decade ago, we were mainly talking about moving physical infrastructure from on-premises systems, to off-site in a vendor's network.

People talked a lot about the obvious savings for business that doesn't have to maintain its own server rooms anymore.

What's happened since then, though, is that virtualization has brought the next step – completely untethering hardware pieces from a physical footprint and co-locating them in larger data centers.

In other words, virtual machines don't ‘sit’ anywhere. They don't have physical connections. You don't have to get inside their guts to deal with CPU and storage capacity and other allocations.

Virtualization and the practice of using containers became one of the next big trend after companies started moving all sorts of data and operations to the cloud. It remains one of the big transfer modernizing business systems. (Read also: 10 Ways Virtualization Can Improve Security)

NoSQL Data Storage

Here's another interesting trend that's been happening over the same time period: the way we approach data storage.

First, cloud became joined by the acronym SaaS (software as a service.) There was a further innovation toward making all kinds of data operations remote and sourcing them off-site from vendor offices. (Read also: Redefining IT Decision-Making in the Age of SaaS.)

At the same time, people were figuring out better ways of retrieving data from its archived location.

When people talk about modern business data centers and data warehouses, they're not talking about traditional relational database design. At least that's the trend – away from old relational database table technology and toward a variety of approaches called noSQL.

In noSQL systems one of the big fundamental changes is that data is not identified by its particular location in a table. Instead, it's defined by its attributes with key-value pairsschemas or other types of innovations.

In other words, the data identifiers allow it to roam free in a less structured database environment, which leads to more capable queries and retrieval practices.

Web 3

As we talk about this third trend, let's also talk about cryptocurrency, which became much more of an integrated presence in our lives throughout the past four or five years.

The first cryptocurrency to make a splash was Bitcoin, and people tried to figure out how to get their heads around the concept of digital currency and blockchain technology.

Then all sorts of other cryptocurrencies started to emerge, including smart contract-handling chains like Ethereum that were able to use tokens to handle data on the blockchain.

Along with that, there was a move toward something called web 3 or the semantic web.

The idea here is that data can move from a simple cloud approach to a more refined place where it exists within semantic structures, noSQL environments and perhaps moves through blockchain oriented processes.

These new trends also mingle with one another.

For instance, BrightStar has developed a resource that is billed by its makers as an “ACID-compliant RDF triple store” that uses a data object layer and semantic web standards to approach data in a whole new way.

Part of the similarity with blockchain and semantic web systems is the use of data objects instead of basic exploration of data locations. Some people describe semantic web as a mapping of the Internet, and others talk about decentralized approaches to networking that complement the decentralization of cryptocurrencies like Bitcoin.

In addition to blockchain technology and cryptocurrency, an emerging aspect of this new web is the metaverse. Described by Mark Zuckerberg as an "embodied internet" where the user is actually part of the experience, this new cloud born tech has been making waves and inspiring many predictions about how exactly it will impact the world. By improving the virtual reality experience, the metaverse is poised to make exciting waves in many lifestyle, gaming and ecommerce sectors, and beyond. (Read also: Gaming, Fashion, Music: The Metaverse Across Industries.)

Conclusion

Virtualization, distributed cloud systems, immutable blockchains and noSQL data environments are continually being refined. They are an integral part of what's going to help our data world evolve beyond what was born in the cloud several years ago as they continue to change in an effort to anticipate and meet the needs of enterprise.

By 

" data-original-title="Written by">Justin Stoltzfus | Reviewed by 
" data-original-title="Reviewed by">Kuntal ChakrabortyCheckmark
Published: April 8, 2022

Virtual Identity
0