PinnedAhilan RajendramAgile Architecture GovernanceNavigating the Dynamic Intersection of Agility and ArchitectureJun 12, 2023Jun 12, 2023
Ahilan RajendramReal-time Cyber Security Threat Sharing and Blocking — Outcomes, Criticism and Strategic GainsOn November 2, 1988, at 8:30 p.m., a 23-year-old university graduate named Robert Tappan Morris released a harmful computer program called…Nov 27, 2023Nov 27, 2023
Ahilan RajendramThe Reality of “Lift and Shift”: Cloud Migration’s Costly TruthAs the digital landscape continues to evolve, cloud migration has emerged as a critical strategy for businesses to enhance operational…Aug 4, 2023Aug 4, 2023
Ahilan RajendramThe Overlooked Pillar: Digital Identity as the Fifth Domain in Digital TransformationIn the ever-changing landscape of digital transformation, businesses are constantly seeking innovative ways to adapt and thrive in the…Jul 24, 2023Jul 24, 2023
Ahilan RajendramVerifiable Credentials Disrupting “Tell Us Once” Programs for a Privacy-Driven FutureThe rise of self-sovereign identity (SSI) with verifiable credentials is starting a new era where people have more control and privacy…Jul 13, 2023Jul 13, 2023