Summary of Distributed Matrix Management for Personal Digital Identity & Humanistic Social Model

A humanistic digital identity for a person is proposed. It is accompanied with a description of societal model that preserve an individual well-being and personal prosperity inder the “Reciprocal Liberty” principle.

Compliance of Agentic AIs with the EU AI Risk Categorisation. Parts 1 & 2.

A wo-part article about how an Agentic AI or a composition of Agentic AIs can be made compliant with the EU AI Act. Also, the article outlines a few inconsistencies in the Act itself and makes recommendations for their resolutions.

Summary for the “Compliance of Agentic AIs with the EU AI Risk Categorisation”

A post that summarises two-part article about how an Agentic AI or a composition of Agentic AIs can be made compliant with the EU AI Act. Also, the article outlines a few inconsistencies in the Act itself and makes recommendations for their resolutions.

My Response to the Biological Food Cloning Enthusiast

A production of biological food can feed all people on the planet and eliminate a hunger, but… since this production will be controlled by a few, e.g. super-rich individuals, the population will be pla ced under the explicit control of the food distribution with a threat of disobedience punishment by hunger. We must put a leash on biological cloning that will result in cloning people, not food only.

Self-Sovereign Digital Identity: Humanistic AI against Digital Slavery

No needs for UDI or DIPP for Human Society. Digital identities like UDI or DIPP ignore human personality and lead to digital slavery. The personal Digital Identity based on the real-life facts about the person allow correct identification of a person among 8.4 billions of people and free from spying over person’s activities online, personal biomedical information and behavioural monitoring of the person.Definitions, parameters, examples and statistical confirmations are provided for your assessment.

On the AI Road that Leads to Identity Hell

A notion of personal identity and Identity Management (IM) are frequently mixed, creating a misreading and speculations about “which one leads the dance”. An appearance of AI has finally put some light on the purpose of this strange mixture. Now, I can say that without an AI-enabled digital identity, you are nobody.

When Cybercrime Helps Common People (digital Robin Hoods)

On 30 April 2025, the Computing online magazine published an article “Dark LLMs designed for cybercrime are on the rise”. The author has written, “Cybercriminals are increasingly adapting large language models for criminal purposes”. Well, yes, but not always… The interviewer Brian Krebs talked with self-proclaimed “grey hat” hacker Rafael Morais about jailbreaking LLMs for …

How to: Integration in an Enterprise. White Paper

In our days of digital omni-interconnection is one of the top buzz-words like “innovation” or “architecture” were recent. It seems that all IT specialists – developers, designers, architects, and managers – are in need for better understanding and use of the term “integration”. For example, what is the difference between “integration” and interaction”? Also, if …

DOES #ENTERPRISE #ARCHITECTURE NEED #PROTECTION IN A #DIGITAL WORLD?

Not long time ago, hashtag#McKinsey & Company decided to advise Enterprise Architects on how they have to change themselves to survive in the digital revolution. Well, it might be a noble mission if such a “business case” was strong. McKensey – the trusted advisor to the world’s leading businesses, governments, and institutions – had identified …

A short-term tactical solution may be good only if you have the long-term solution observed/understood already

During a recession, every company faces a dilemma – where to put its management attention and funds – in the short-term surviving projects/products or the long-term ones as well. IMHO, if you are concerned about survival only, you will lose immediately after the recession ends even if you survive it. My advice is to put …

Recent ARTICLES published in #LinkedIn

Are Clouds now heading to a Thunderstorm? by Michael Poulin, 2022. Does #Enterprise #Architecture need #protection in a #digital world? by Michael Poulin, 2022. If experts still define EA differently, what is EA actually?  by Michael Poulin, 2022. This is the article #100; 12,184 Impressions.  Shared Services in a Nutshell by Michael Poulin, 2022.  Risks of …

#Code of #DevOps #Practice

Code of DevOps Practice is an open proposal for organising creative work of DevOps in modern enterprise. The document includes: subject, cause, values, pillars and principles of the DevOps development as well as some best practice recommendations and a list of referred articles.

#Why We Need #Agile #Agility for #DevOps

While DevOps have elevated delivery velocity to the level that only Sun is higher and made it the goal and work effectiveness criteria (regardless quality), they still claim they are agile. The article takes a look into Agile Manifesto and Scrum Guide for the role of velocity. Neither the Agile Manifesto nor the latest version of the Scrum Guide (2017) reveals velocity at all, but have many loopholes inherited by DevOps.

Problems in #Microservice #QA and #Solutions

One of the major task of DevOps is a speedy delivery of Microservice into production. The major objective of QA and Testing is to find as many bugs as possible. Fixing these bugs slows down the delivery. The article describes this conflict in details, outlines problems in testing articulated by Mr Martin Fowler, proposes additional tests and explains how to improve quality of the released Microservices.

#Microservice #Protection based on the principle of #Zero #Trust

The task addressed in the article is about protecting Microservice’s functionality and resources in the inter-Microservice interactions. Known techniques like OpenID Connects, JWT and OAuth2 were reviewed from the perspective of Microservice interactions. It has been found that these techniques cannot be applied as-is to the Microservices either because unanswered questions to them or because of doubtful trustfulness of related workflows.
The article proposes two protective methods for Microservice (or service) that have sensitive functionality and/or resources. While the Basic Protection Method is just a classic identity verification and following access permission control, the method does not require single centralised Identity and Permission Authorities. The latter can be distributed as needed following the distribution of Microservice-based applications. The Closed Optimised Protection Method replaces Identity and Permission Authorities with Dependency Catalogue Service per application and provides full protection with performance comparable with OpenID-JWT/OAuth2.

Split and Join of #Functional and #Informational #Microservices

Article defines Functional Microservices using gRPC interface versus Informational Microservices accessible via RESTful interface. The Functional Microservices are validated against distortionless criteria. The code example of Interface definition for Functional Microservice is provided together with options allowing passing data together with function invocation.

#Distorted #Microservices

People like rubbish because it is convenient… Almost a Fairy-Tale about Microservices Are We Clear about What is What? Let’s Expose the ‘Devil’ that is Sitting in Details Distortions 1 to 12 A First Glance on Modelling Distortionless Microservices Almost a Fairy-Tale about Microservices Once upon a time, technology was conquered by marketing buzz and …