Year: 2020

To Build or To Buy

The Cost of Not Offering Federated Identity The inability to offer federated identity via an IAM platform like Auth0 blocks growth. Enterprise customers expect the ease and security of federated identity, and if you can’t deliver, they may take their…

OAuth2 and OpenID Connect The Professional Guide

This book will help you to make sense of OAuth, OpenID Connect, and the many moving parts that come together to make authentication and delegated authorization happen. You will discover how authentication and authorization requirements changed in past years, and…

Identity is the Perimeter

The idea of identity as the new perimeter for cybersecurity has been part of the conversation for a couple of years. The truth is that identity has always been a perimeter. Historically, cybersecurity experts did not apply multiple security controls…

How Companies are Using IAM Catalyst for Digital Transformation

It’s hard to find a company that isn’t investing in digital transformation in 2020. Particularly in the face of the COVID-19 pandemic, which has forced us all to adapt the way we work and interact, digital transformation is here to…

Fixing Broken Authentication

Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken authentication, is a potentially…

Credential Stuffing Attacks

Compromised user credentials are a common attack vector, and can lead to sustained, costly attacks. As an Identity-as-a-service provider (IDaaS), Auth0 sees a large number of attacks targeting user credentials across our customer base. Some of our customers are under…

Build-vs-Buy evaluating identity management

Identity and Access Management (IAM), or simply identity management, refers to a service or platform that identifies individuals and controls their access to system resources through user rights and restrictions. Identity management is important for security and increases the productivity…

Ultralow noise hi current compact DC-to-DC converter solution

Data processing ICs—such as field-programmable gate arrays (FPGAs), systems on a chip (SoCs), and microprocessors—continually increase their reach intotelecommunications, networking, industrial, automotive, avionics, and defense systems. One common thread throughout these systems is ever-increasing processing power, resulting in corresponding increases…

Power up phase determinism using multichip synchronization.

The integration of multiple digital signal processing (DSP) blocks, wideband digital-to-analog converters (DACs), and wideband analog-to-digital converters (ADCs)within a single monolithic chip is now enabling the offload of power-hungry FPGA resources to allow for a smaller footprint, lower power, increased…

How to successfully calibrate an open loop DAC signal-chain

Any practical electronic application is subject to multiple sources of error that can make the most precise components deviate from their datasheet behavior.When the application signal chain doesn’t have a built-in mechanism to self adjust for these errors, the only…

Technology

Tips for taking great city photos with your smartphone

This is an example of a gallery post. Number of columns you choose matches the number of thumbnails you see.

Technology

Digital Art and Technology Creating Beauty

Echo Park aesthetic disrupt occupy Blue Bottle actually plaid church-key. Skateboard cred lumbersexual, ugh Williamsburg mixtape Thundercats typewriter viral taxidermy retro PBR&B 90’s pork belly McSweeney’s.