A humanistic digital identity for a person is proposed. It is accompanied with a description of societal model that preserve an individual well-being and personal prosperity inder the “Reciprocal Liberty” principle.
Category Archives: Innovations
A New Concept for Authentication and Authorisation for AI Agents
Solution for controlling authentication and authorisation of AI Agents without attaching these controls to the agents .
Compliance of Agentic AIs with the EU AI Risk Categorisation. Parts 1 & 2.
A wo-part article about how an Agentic AI or a composition of Agentic AIs can be made compliant with the EU AI Act. Also, the article outlines a few inconsistencies in the Act itself and makes recommendations for their resolutions.
Summary for the “Compliance of Agentic AIs with the EU AI Risk Categorisation”
A post that summarises two-part article about how an Agentic AI or a composition of Agentic AIs can be made compliant with the EU AI Act. Also, the article outlines a few inconsistencies in the Act itself and makes recommendations for their resolutions.
My Response to the Biological Food Cloning Enthusiast
A production of biological food can feed all people on the planet and eliminate a hunger, but… since this production will be controlled by a few, e.g. super-rich individuals, the population will be pla ced under the explicit control of the food distribution with a threat of disobedience punishment by hunger. We must put a leash on biological cloning that will result in cloning people, not food only.
Self-Sovereign Digital Identity: Humanistic AI against Digital Slavery
No needs for UDI or DIPP for Human Society. Digital identities like UDI or DIPP ignore human personality and lead to digital slavery. The personal Digital Identity based on the real-life facts about the person allow correct identification of a person among 8.4 billions of people and free from spying over person’s activities online, personal biomedical information and behavioural monitoring of the person.Definitions, parameters, examples and statistical confirmations are provided for your assessment.
On the AI Road that Leads to Identity Hell
A notion of personal identity and Identity Management (IM) are frequently mixed, creating a misreading and speculations about “which one leads the dance”. An appearance of AI has finally put some light on the purpose of this strange mixture. Now, I can say that without an AI-enabled digital identity, you are nobody.
When Cybercrime Helps Common People (digital Robin Hoods)
On 30 April 2025, the Computing online magazine published an article “Dark LLMs designed for cybercrime are on the rise”. The author has written, “Cybercriminals are increasingly adapting large language models for criminal purposes”. Well, yes, but not always… The interviewer Brian Krebs talked with self-proclaimed “grey hat” hacker Rafael Morais about jailbreaking LLMs for …
Continue reading “When Cybercrime Helps Common People (digital Robin Hoods)”
How to: Integration in an Enterprise. White Paper
In our days of digital omni-interconnection is one of the top buzz-words like “innovation” or “architecture” were recent. It seems that all IT specialists – developers, designers, architects, and managers – are in need for better understanding and use of the term “integration”. For example, what is the difference between “integration” and interaction”? Also, if …
Continue reading “How to: Integration in an Enterprise. White Paper”
DOES #ENTERPRISE #ARCHITECTURE NEED #PROTECTION IN A #DIGITAL WORLD?
Not long time ago, hashtag#McKinsey & Company decided to advise Enterprise Architects on how they have to change themselves to survive in the digital revolution. Well, it might be a noble mission if such a “business case” was strong. McKensey – the trusted advisor to the world’s leading businesses, governments, and institutions – had identified …
Continue reading “DOES #ENTERPRISE #ARCHITECTURE NEED #PROTECTION IN A #DIGITAL WORLD?”
A short-term tactical solution may be good only if you have the long-term solution observed/understood already
During a recession, every company faces a dilemma – where to put its management attention and funds – in the short-term surviving projects/products or the long-term ones as well. IMHO, if you are concerned about survival only, you will lose immediately after the recession ends even if you survive it. My advice is to put …
Ontology-based View on Architecture of Business Organisation
Ontology of the Architecture of Business/Enterprise with description (Organic Organisation Model supplement)
Recent ARTICLES published in #LinkedIn
Are Clouds now heading to a Thunderstorm? by Michael Poulin, 2022. Does #Enterprise #Architecture need #protection in a #digital world? by Michael Poulin, 2022. If experts still define EA differently, what is EA actually? by Michael Poulin, 2022. This is the article #100; 12,184 Impressions. Shared Services in a Nutshell by Michael Poulin, 2022. Risks of …
#Code of #DevOps #Practice
Code of DevOps Practice is an open proposal for organising creative work of DevOps in modern enterprise. The document includes: subject, cause, values, pillars and principles of the DevOps development as well as some best practice recommendations and a list of referred articles.
#Why We Need #Agile #Agility for #DevOps
While DevOps have elevated delivery velocity to the level that only Sun is higher and made it the goal and work effectiveness criteria (regardless quality), they still claim they are agile. The article takes a look into Agile Manifesto and Scrum Guide for the role of velocity. Neither the Agile Manifesto nor the latest version of the Scrum Guide (2017) reveals velocity at all, but have many loopholes inherited by DevOps.
Problems in #Microservice #QA and #Solutions
One of the major task of DevOps is a speedy delivery of Microservice into production. The major objective of QA and Testing is to find as many bugs as possible. Fixing these bugs slows down the delivery. The article describes this conflict in details, outlines problems in testing articulated by Mr Martin Fowler, proposes additional tests and explains how to improve quality of the released Microservices.
#Microservice #Protection based on the principle of #Zero #Trust
The task addressed in the article is about protecting Microservice’s functionality and resources in the inter-Microservice interactions. Known techniques like OpenID Connects, JWT and OAuth2 were reviewed from the perspective of Microservice interactions. It has been found that these techniques cannot be applied as-is to the Microservices either because unanswered questions to them or because of doubtful trustfulness of related workflows.
The article proposes two protective methods for Microservice (or service) that have sensitive functionality and/or resources. While the Basic Protection Method is just a classic identity verification and following access permission control, the method does not require single centralised Identity and Permission Authorities. The latter can be distributed as needed following the distribution of Microservice-based applications. The Closed Optimised Protection Method replaces Identity and Permission Authorities with Dependency Catalogue Service per application and provides full protection with performance comparable with OpenID-JWT/OAuth2.
#Distorted #Microservices
People like rubbish because it is convenient… Almost a Fairy-Tale about Microservices Are We Clear about What is What? Let’s Expose the ‘Devil’ that is Sitting in Details Distortions 1 to 12 A First Glance on Modelling Distortionless Microservices Almost a Fairy-Tale about Microservices Once upon a time, technology was conquered by marketing buzz and …
#API – a problem of choice
The article briefly observes new risks, pros and cons for REST, gRPC and GraphQL interfaces for API and Microservices.