Putting Guard Rails Around ShadowIT: Reference Architecture-as-Code

Central IT groups and CIO’s have always been accountable for the governance of their software portfolios.  Historically this has been through top down approaches.  For certain aspects of the business, such as accounting, real time computing, manufacturing, etc, such

Read more

CORDA Security Enhancement Series: Improving Security & Flexibility on a Private Corda Node with Layer 3 Governance

How Corda Networks Operate - Overview

Corda networks are peer to peer, private networks for distributed ledger business transactions. These networks are accessible by deploying one’s own Corda node with an X509 certificate signed by a Corda network operator.

Read more