California Consumer Privacy Act (CCPA)Over the past decades, California’s legislature adopted many privacy-protecting regulations. The most recent one is the California Consumer Privacy Act (“CCPA”). Stringent laws aim not only to safeguard the interests of consumers and the public, but they also nudge technology companies to innovate and look for new ways of approaching and handling private data.
Learn more... |
General Data Protection Regulation (GDPR)The primary objectives of the GDPR are to give control back to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU, where a person shall be able to obtain or transfer their personal data from one electronic processing system to and into another, without being prevented from doing so by the data controller.
Learn more... |
Federated Identity - linking electronic identity across multiple identity management systems.Evolving identity management challenges, and especially the challenges associated with cross-company, cross-domain access, have given rise to a new approach to identity management, known now as "federated identity management". A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems. A user authentication ticket, or token - trusted across multiple IT systems or even organizations.
Learn more... |
Revised Directive on Payment Services (PSD2)The PSD provides the legal framework within all payment service providers serving european citizens in europe must operate. The Directive's purpose is to increase pan-European competition and participation in the payments industry also from non-banks, and to provide for a level playing field by harmonizing consumer protection and the rights and obligations for payment providers and users. The new PSD2 rules aim to better protect consumers when they pay online, promote the development and use of innovative online and mobile payments, and make cross-border European payment services safer.
Learn more... |
API Economy - The B2B InternetAPIs make it easier to standardize, integrate and connect people, places, systems, data and algorithms, create new user experiences, share data, functions and information, authenticate people and things, enable transactions and algorithms, leverage third-party software, algorithms, AI etc., and to create new services and business models. The accelerating growth of the API economy isn’t because of any one reason, but rather a because of sectors and business emerging that all rely more and more on APIs to do or expand digital business.
Learn more... |
My Data - Human-centered personal data management and processingIndividuals are empowered actors, not passive targets, they have the right and practical means to manage their data and privacy. It is essential that personal data is technically easy to access and use – it is accessible in machine readable open formats via secure, standardized APIs (Application Programming Interfaces). MyData is a way to convert data from closed silos into an important, reusable resource, based on the right of individuals to access the data collected about them. The core idea is that individuals should be in control of their own data.
Learn more... |
Blockchain - Distributed Ledger TechnologyAn open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way (independent of any single system). By design, blockchains are inherently resistant to modification of the data. Blockchains are secure by design and are an example of a distributed computing system with high Byzantine fault tolerance. This makes blockchains potentially suitable for the recording of events, records and other records management activities, such as identity management, transaction processing and documenting provenance.
Learn more... |
Serverless Architecture - Better use of resources and security against threats.Clouds with virtual servers, have become the standard for many online services. Now the world is transitioning to next level serverless cloud services that offer many benefits over the traditional cloud server models. There are, of course, still servers in serverless solutions, so serverless means dynamic allocation of server resource. These solutions are also called Function-as-a-Service, FaaS. Most leading cloud providers already offer serveless services, for example AWS Lambda, Google Cloud Functions, IBM OpenWhisk, and Microsoft Azure Functions.
Learn more... |
Merkle tree (hash tree) - verification of the contents of data structuresHash trees are used to verify any kind of data stored, handled and transferred in and between computers. Currently the main use of hash trees is to make sure that data blocks received from other peers in a peer-to-peer network are received undamaged and unaltered, and even to check that the other peers do not lie and send fake blocks.
Learn more... |