An Intellyx Brain Candy Brief Web and mobile application users can be extremely sensitive to application usability and latency issues. If an application is not…
An Intellyx Brain Candy Update Since we last covered Kanerika in February 2025, the company has repositioned FLIP, its self-service DataOps-empowered workflow automation platform, as…
Part 3 of Jason English’s “Life at the End of the Funnel – A Technology Bard’s Tale” After making TV commercials and award-winning CD-ROM games…
Appdome’s IDAnchor™ Gets New Risk Intelligence APIs to Power Mobile Reputation & the Enterprise AI Age “Mobile devices are more a part of daily life…
BrainBlog for Next Pathway by Jason Bloomberg In the late eighteenth century, a chess-playing automaton called the Mechanical Turk was a sensation across the courts…
Article for SiliconANGLE by Jason Bloomberg Asimov’s Three Laws of Robotics may be intentionally flawed, but they teach us important lessons about agentic artificial intelligence…
LinkedIn post by Didis Guarda I curated the top cybersecurity leaders around the world, along with my team at Citiesabc.com and Businessabc.net to outline how…
First Layer 7 solution to bring verified application identity, trusted device context, precise location, and deep session risk into API Authorization “New AI-based attack vectors…
An Intellyx Brain Candy Brief In the modern cybercrime environment you cannot simply deploy an application into production on the network without basic security controls…
An Intellyx Brain Candy Brief Authorization is essentially an unsolved problem in computing. Partial solutions exist, but it’s still not possible to define in any…


