Published inHubrix.coWe think, therefore I/AM:The Case for separating Identity from Access ManagementOct 17, 20181Oct 17, 20181
Published inHubrix.co5 Things You Didn’t Know Are Access ControlEven for seasoned software developers, wading into the world of IAM (Identity & Access Management) and Access Control can be a bit…Jul 10, 2018Jul 10, 2018
Published inHubrix.coGetting Serious about Social EnterpriseI love it when circumstances leave a gift-wrapped insight on my doorstep. I had such a serendipitous moment last weekend, about new…Jun 12, 2018Jun 12, 2018
Published inHubrix.coAccess Control Use Cases for SaaS CRMA sales team is a sometimes-splendid, sometimes-frightening example of “coopetition.” As in The Hunger Games, there are shifting alliances…Apr 5, 2018Apr 5, 2018
Published inHubrix.coToxic APIs, or Don Quixote 2.0(This post originally appeared on hubrix.co in March 2017).Jan 29, 2018Jan 29, 2018
Published inHubrix.coPasswords and AliensMany alien-invasion movies rely on this plot device: the aliens have one central ship, or queen, or machine that can be destroyed…Jan 10, 2018Jan 10, 2018
Published inHubrix.coMy Co-founder Quit. What Now? Keep Going.(This post originally appeared on hubrix.co)Jun 28, 2017Jun 28, 2017
Published inHubrix.coSingle-Function APIs: Boring is the New SexyThe API Economy is coming into its own and gaining momentum. Major players are placing big bets: VC Firm Accel Partners has long been…Jun 13, 2017Jun 13, 2017
Published inHubrix.coFBAC: Towards “Silo-free” Access ControlAuthor’s note: This is a complex topic, and some of this is business/strategy-oriented while the rest of it is rather technical. To best…Mar 8, 2017Mar 8, 2017