Phil Windley's Technometria
Subscribe
Sign in
Home
Notes
Chat
Archive
About
Rule-Based Programming and the Internet of Things
Rule-based, actor model systems are a great match for IoT workloads. Picos are a rule-based system for programming in the Internet of Things (IoT…
May 27
•
Phil Windley
2
Share this post
Rule-Based Programming and the Internet of Things
www.technometria.com
Copy link
Facebook
Email
Notes
Other
New
Top
Community
Streaming Trust
Federated identity stores are like music CDs: large troves of data to be consumed from a single source. Self-sovereign identity is like streaming: share…
May 15
•
Phil Windley
1
Share this post
Streaming Trust
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Internet Identity Workshop Report
Last week was the 36th Internet Identity Workshop. Almost 300 people from around the world called 160 sessions. The energy was high and I enjoyed seeing…
Apr 24
•
Phil Windley
Share this post
Internet Identity Workshop Report
www.technometria.com
Copy link
Facebook
Email
Notes
Other
OAuth and Fine-grained Access Control
Some of the following is excerpted from my new book Learning Digital Identity from O'Reilly Media. OAuth was invented for a very specific purpose: to…
Apr 11
•
Phil Windley
1
Share this post
OAuth and Fine-grained Access Control
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Minimal vs Fully Qualified Access Requests
By creating fully qualified authorization contexts from minimal requests, a PIP reduces the burden on developers building or integrating PEPs, allows…
Mar 30
•
Phil Windley
Share this post
Minimal vs Fully Qualified Access Requests
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Passkeys: Using FIDO for Secure and Easy Authentication
Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication…
Mar 22
•
Phil Windley
Share this post
Passkeys: Using FIDO for Secure and Easy Authentication
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Monitoring Temperatures in a Remote Pump House
If you've got a sensor that isn't within easy range of wifi, then LoraWAN is a good solution. And event-based rules in picos are a convenient way to…
Mar 14
•
Phil Windley
Share this post
Monitoring Temperatures in a Remote Pump House
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Not all PBAC is ABAC: Access Management Patterns
Exploring the architectural patterns we can use with policy-based access control (PBAC) illustrates the difference between policy-based and…
Mar 8
•
Phil Windley
Share this post
Not all PBAC is ABAC: Access Management Patterns
www.technometria.com
Copy link
Facebook
Email
Notes
Other
See all
Phil Windley's Technometria
Digital identity and decentralized systems
Subscribe
Phil Windley's Technometria
Subscribe
About
Archive
Sitemap
Share this publication
Phil Windley's Technometria
www.technometria.com
Copy link
Facebook
Email
Notes
Other
Phil Windley's Technometria
Digital identity and decentralized systems
Launched 3 years ago
Subscribe
No thanks
By registering you agree to Substack's
Terms of Service
, our
Privacy Policy
, and our
Information Collection Notice
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts