RSS feed Get our RSS feed

News by Topic

auth0

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name
By: Auth0     Published Date: May 12, 2016
An online game such as Marks and Spencerís holiday Pass The Parcel campaign is in many ways, the worst case authentication scalability demand. The viral nature of the game generates massive numbers of registration and login events through both social providers and through username/password as eager players open presents and engage their friends to play. The game builds a huge audience of active players that remain active for the entire promotion while recruiting even more players, each of whom must register and then login to play, often multiple times per day.
Tags : auth0, authentication, scalability, marks and spencers, authentication demand
     Auth0
By: Auth0     Published Date: May 12, 2016
Letís be honest: If youíre just using one or two social providers for a simple web application, without needing a username/password database yourself, or any other more elaborate features, it is easy enough to DIY. By all means, leverage the basic authentication libraries you can find in any open source framework, and be done with it.
Tags : auth0, identity management, web application, framework, developer
     Auth0
By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. Itís the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : auth0, hipaa, compliance, health insurance, legislation
     Auth0
By: Auth0     Published Date: May 16, 2016
The pre-eminent medical education and research organizations in the U.S. combine forces to help find cures to the most complex medical mysteries - with medical identity secured by Auth0.
Tags : medical, medical mysteries, medical identity, medical security, security
     Auth0
By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : autho, industry identity, authentication, database information, custom and proprietary code, security
     Auth0
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics