Web3 and Decentralized ID
cloud203019 Elo 2022

Web3 and Decentralized ID

How do we handle distributing identity? DID stands for distributed identifiers, and today we talk about Web3 as well as distributing identity. Distributing identity is not just about people and personal identity, but also about things and how we identify and track different things in a distributed way without a centralized infrastructure. That's fundamental to what Web3 is talking about. How do we break down the centralization that we have been building over the last 15 years of what Web3 people call Web2, and look at ways to do it in a decentralized way where the trust is between the parties involved? Where it's set up in a way that you don't have to have a centralized trust authority. We spend a lot of time talking about this, what the spec is, what it means, and looking at it in a broader context. Transcript: https://otter.ai/u/lT1uCvM01HxlhROTlGBkq2U1toU Image: https://www.pexels.com/photo/two-book-on-woman-head-1215714/

Jaksot(500)

Advanced SSH [TechOps]

Advanced SSH [TechOps]

SSH and Secure Shell is one of those topics that people take for granted because it is a ubiquitous way to log in and access systems. True to form for the TechOps series, though, we break that down in...

6 Syys 202450min

High Availability [TechOps Series]

High Availability [TechOps Series]

Is high availability always a good thing? Today our discussion takes an operations perspective. We look at places where you were over or under committing high availability, where you were confusing di...

30 Elo 202447min

AI And Digital Twins

AI And Digital Twins

We dive into AI, manufacturing and how to improve manufacturing outcomes by better analyzing data. If you are interested in manufacturing or advanced applications of AI and digital twins - which is ...

23 Elo 20241h 1min

UEFI Trust & Secure Boot Issue

UEFI Trust & Secure Boot Issue

We explore the UEFI certificate issue in which secure boot is potentially compromised. Certificates that are included in most UEFI BIOSes have been compromised in ways that could easily be used as an ...

16 Elo 202445min

AI Platform Consolidation & Walled Gardens

AI Platform Consolidation & Walled Gardens

We discuss the impact AI and data sovereignty data protection will have on platforms, consolidated management of your data like in Office by Microsoft or Google, on premises, and systems. This include...

10 Elo 202450min

Two But Rule by John Wolpert [Book Discussion]

Two But Rule by John Wolpert [Book Discussion]

This episode is one of our book club episodes starring John Walpole, who wrote the Two But Rule, which is very tongue in cheek while also very serious about momentum thinking and using a negative boun...

8 Elo 202452min

Crowd Strike vs Operations Responsibility

Crowd Strike vs Operations Responsibility

This episode explores the intersection of infrastructure automation and security through the lens of the Crowd Strike outage. We'll discuss the tension between maintaining stable, reliable data center...

2 Elo 202451min

Containers And Walled Gardens

Containers And Walled Gardens

We start talking about walled gardens and the momentum and push that causes us to get into vendor active environments in this episode. This is going to be a multi-part discussion where we look at the ...

27 Heinä 202432min