Federated knowledge graphs are systems that connect multiple independent knowledge graphs, allowing them to work together without merging all their data into one place. Each knowledge graph in the federation keeps its own data and control, but they can share information through agreed connections and standards. This approach helps organisations combine insights from different sources…
Category: Enterprise Architecture
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC) is a way of managing who can access information or resources based on specific characteristics, called attributes. These attributes can relate to the user, the resource, the action being taken, or the context, such as time or location. ABAC enables flexible and precise access rules that go beyond simple roles or…
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC) is a method for managing user permissions within a system by assigning roles to users. Each role comes with a set of permissions that determine what actions a user can perform or what information they can access. This approach makes it easier to manage large groups of users and ensures that…
OpenID Connect
OpenID Connect is a simple identity layer built on top of the OAuth 2.0 protocol. It allows users to use a single set of login details to access multiple websites and applications, providing a secure and convenient way to prove who they are. This system helps websites and apps avoid managing passwords directly, instead relying…
Flashbots Architecture
Flashbots architecture refers to the system and methods used to connect blockchain users, searchers, and miners or validators in a way that allows for transparent and efficient transaction ordering. It helps prevent unfair practices like front-running by creating a separate communication channel for submitting and processing transactions. The architecture uses off-chain communication and specialised software…
Stateless Clients
Stateless clients are systems or applications that do not keep track of previous interactions or sessions with a server. Each request made by a stateless client contains all the information needed for the server to understand and process it, without relying on stored context from earlier exchanges. This approach allows for simpler, more scalable systems,…
Shadow IT Discovery
Shadow IT Discovery is the process of finding and identifying software, applications, or devices used within an organisation without official approval or oversight by the IT department. These unauthorised tools can include cloud services, messaging apps, or hardware that employees use to do their jobs more efficiently or conveniently. Discovering shadow IT helps organisations understand…
Identity and Access Management (IAM)
Identity and Access Management (IAM) is a set of processes and technologies used to ensure that the right individuals have the appropriate access to resources in an organisation. It involves verifying who someone is and controlling what they are allowed to do or see. IAM helps protect sensitive data by making sure only authorised people…
Directed Acyclic Graph (DAG)
A Directed Acyclic Graph, or DAG, is a collection of points, called nodes, connected by arrows, called edges, where each arrow has a direction. In a DAG, you cannot start at one node and follow the arrows in a way that leads you back to the starting point. This structure makes DAGs useful for representing…
EVM Compatibility
EVM compatibility means that a blockchain can run software and smart contracts designed for the Ethereum Virtual Machine. This allows developers to use familiar tools and programming languages when building applications on different blockchains. Blockchains with EVM compatibility can interact with Ethereum-based apps and services more easily.