Robuta

https://www.acxiom.com.mx/ Data, Identity Solution & People-Based Marketing Solutions | Acxiom Aug 14, 2025 - Acxiom's data and technology transform marketing – giving our clients the power to manage audiences, personalize customer experiences and create profitable... people based marketingdata https://www.elisity.com/ Simplify Network Segmentation | Elisity Identity-Based Microsegmentation Simplify network segmentation with Elisity's identity-based microsegmentation with advanced policies for users, devices, and applications. identity basedsimplifynetwork https://badoo.com/en/the-blog/badoos-new-identity-based-hate-policy Badoo's New Identity-Based Hate Policy | Badoo To keep targeted hate off of our platform, we’ve updated our policy on how we respond to this type of content and behaviour. Read our new identity-based hate... new identitybased hatebadoo https://namati.org/publications/a-community-based-practitioners-guide-documenting-citizenship-and-other-forms-of-legal-identity/ A Community-Based Practitioner’s Guide: Documenting Citizenship and Other Forms of Legal Identity... Sep 27, 2023 - Today, 1.1 billion people around the world lack legal identity documentation. Without it, they cannot vote, access healthcare, or go to school—and are at... community basedguideforms https://the-brandidentity.com/project/los-yorks-pixel-based-system-gives-netflixs-eyeline-a-bold-new-vision Los York’s pixel-based system gives Netflix’s Eyeline a bold new vision — The Brand Identity... pixel basedsystem giveslos https://www.creativeboom.com/inspiration/kirkland-urban-rebrand/ People People crafts colourful identity based on building blocks for urban development | Creative... The Seattle agency draws on modular and geometric forms to create striking new branding for Kirkland Urban, a mixed-use development in King County, Wa... identity basedbuilding blocks https://www.afcea.org/signal-media/software-overlay-provides-identity-based-security-layer-osi-model Software Overlay Provides Identity-Based Security Layer to OSI Model | AFCEA International provides identitysoftwareosi https://community.f5.com/kb/technicalarticles/f5-big-ip-access-policy-manager-apm-identity-based-steering-with-ssl-orchestrato/313037 F5 BIG-IP Access Policy Manager (APM) Identity-based steering with SSL Orchestrator (SSLO) Having the power of F5 APM as an Identity Aware Proxy and F5 SSLO allows to have a flexible organization-wide secure access layer. big ipaccess policymanagerapm https://ourworldindata.org/grapher/employment-discrimination-bans-lgbt Employment discrimination based on sexual orientation or gender identity prohibited - Our World in... employment discrimination https://www.wionews.com/entertainment/lifestyle/kolkata-based-sarod-player-flees-bangladesh-hides-indentity-after-his-concert-venue-is-vandalised-in-dhaka-1766394094261 Kolkata-based Sarod player flees Bangladesh, hides identity after his concert venue is vandalised... Dec 22, 2025 - Kolkata-based sarod player Shiraz Ali Khan had to flee Bangladesh after his concert venue in Chhayanaut was vandalised. Shiraz had a harrowing time on his... kolkata basedsarod player https://www.noemamag.com/purity-vs-plurality-in-india/ Modi's Hindu 'Civilization' Is Just Identity-Based Nationalism Feb 7, 2023 - Narendra Modi’s brood of Hindu nationalists, while ostensibly rooting for a return of an Indian civilizational state, are in fact merely envisioning a... identity basedmodihindu https://www.netowl.com/ NetOwl® — AI-based Text Analytics and Identity Analytics for Big Data May 9, 2024 - NetOwl is a suite of AI-based entity extraction, sentiment analysis, name matching, and identity resolution tools for Big Data ai basedtext analytics https://www.gieom.com/bahrain-based-islamic-retail-bank-goes-live-on-ai-powered-online-identity-verification-for-seamless-customer-onboarding/ Bahrain based Islamic retail bank goes live on AI-powered Online Identity Verification for Seamless... Feb 22, 2025 - Right from the inception the bank understood the importance of customer experience and their objective was to allow their customers to open an account and retail bankgoes livebahrain https://www.keyshare.id/physical-access/ KeyShare for Physical Access — Identity-Based Building Access & Visitor Management Eliminate mobile credential costs. Authorize people, not tokens. KeyShare runs on your existing Mercury panels and PACS software — no rip-and-replace. physical accessidentity based Sponsored https://www.tushyraw.com/ TUSHY RAW: Intense 4K Videos Featuring Raw Passion from Behind TUSHY RAW delivers powerful scenes with stunning performers exploring their wild side. Shot in striking 4K, experience real chemistry and bold action from behind... https://www.shiftleft.org/papers/gibe/ shiftleft.org — Generalized identity-based and broadcast encryption schemes identity basedshiftleft https://www.idsalliance.org/blog/from-aaa-to-assurance-how-the-uk-telecoms-security-act-is-shaping-identity-based-network-control/ From AAA to Assurance: How the UK Telecoms Security Act Is Shaping Identity-Based Network Control |... Nov 5, 2025 - Learn what the UK TSA means for identity-based network control. Enforce least privilege, tie admin access to identity, and improve traceability. security actaaaassuranceuk https://mixmagmena.com/feature/meet-black-camel-records-the-dubai-based-label-set-to-fuse-sound-fashion-and-identity Meet Black Camel Records: The Dubai-based label set to fuse sound, fashion and identity - Features... dubai basedlabel setmeetblack https://ourworldindata.org/grapher/employment-discrimination-lgbt-equaldex Employment discrimination based on sexual orientation or gender identity - Our World in Data Includes discrimination in hiring, promotion, termination and harassment at work. Only legal status considered, not enforcement. employment discrimination https://www.uwsuper.edu/student-life/get-involved/identity-based-organizations/ Identity-Based Organizations - UW Superior organizations uw superior https://curity.io/solutions/secure-iam-in-the-age-of-ai/ Secure AI with Identity-Based Access Control | Curity based access controlsecure ai https://www.keyfactor.com/blog/3-things-to-know-about-keyfactors-pki-based-identity-for-agentic-ai/ 3 Things to Know About Keyfactor’s PKI-Based Identity for Agentic AI | Keyfactor Nov 17, 2025 - Embrace AI safely with Keyfactor’s PKI foundation, where AI agents gain the same strong, auditable identity as humans and devices. pki basedthingsknowidentity https://www.novatiq.com/ Novatiq | Telco-Based Identity Solution Novatiq is the only platform offering telco-based identity solutions for the open web. We unlock opportunities right across the ad ecosystem. Find out more... based identitynovatiqtelco https://intellectdiscover.com/content/journals/10.1386/ctl_00037_1 How do school-based ceremonies contribute to adolescents’ identity design? A case study in two... This article discusses the contribution of school-based ceremonies in two Israeli Druze schools to shaping identity and deepening the sense of citizenship... school basedidentity design https://www.securew2.com/non-human-identity-access EAP-TLS Machine Identity with Certificate-Based Auth | SecureW2 Oct 15, 2025 - EAP-TLS machine identity replaces shared secrets with X.509 certificates, securing devices and services through scalable, passwordless auth. eap tlsmachine identitybased https://www.genua.eu/press-article/genusphere-identity-based-and-application-specific-access-to-internal-applications-without-vpn genusphere: Identity Based and Application Specific Access to Internal Applications without VPN genusphere ensures that end users can only access applications approved for them via a browser - without a VPN. The centrally hosted software consistently... identity basedgenusphere https://playporngames.com/mindware-infected-identity/ MindWare: Infected Identity – Play Porn Games - Free HTML Porn Games and Text-Based Sex Stories You play as a former freelance hacker, who has just become infected with a gender-altering mindware and now must find a way to deal with this problem. mindware infected identity https://delinea.com/blog/identity-security-solutions-and-ai-agents Are Identity Security Tools Ready for an AI-based Workforce? Adopting Agentic AI means addressing three unique challenges posed by these new agents. Here they are, and what to do about them. identity securityai based https://brite.com/identity-secured-how-itdr-combats-credential-based-attacks/ Identity Secured: How ITDR Combats Credential-Based Attacks | Brite credential based attacksitdr https://www.computerweekly.com/opinion/How-to-fend-off-identity-based-cyber-attacks How to fend off identity-based cyber attacks | Computer Weekly based cyber attacksfendweekly https://saviynt.com/ Saviynt | AI-Based Identity Security and Access Management Platform Solutions Saviynt's identity security platform secures and governs every identity - human, non-human, and AI agent - across your entire digital ecosystem. access management platformai https://connectedsocialmedia.com/423/plaxo-to-ship-online-identity-aggregator-based-on-microformats/ Plaxo to ship online identity aggregator based on microformats | Connected Social Media shiponlineidentityaggregator