https://www.acxiom.com.mx/
Data, Identity Solution & People-Based Marketing Solutions | Acxiom
Aug 14, 2025 - Acxiom's data and technology transform marketing – giving our clients the power to manage audiences, personalize customer experiences and create profitable...
people based marketingdata
https://www.elisity.com/
Simplify Network Segmentation | Elisity Identity-Based Microsegmentation
Simplify network segmentation with Elisity's identity-based microsegmentation with advanced policies for users, devices, and applications.
identity basedsimplifynetwork
https://badoo.com/en/the-blog/badoos-new-identity-based-hate-policy
Badoo's New Identity-Based Hate Policy | Badoo
To keep targeted hate off of our platform, we’ve updated our policy on how we respond to this type of content and behaviour. Read our new identity-based hate...
new identitybased hatebadoo
https://namati.org/publications/a-community-based-practitioners-guide-documenting-citizenship-and-other-forms-of-legal-identity/
A Community-Based Practitioner’s Guide: Documenting Citizenship and Other Forms of Legal Identity...
Sep 27, 2023 - Today, 1.1 billion people around the world lack legal identity documentation. Without it, they cannot vote, access healthcare, or go to school—and are at...
community basedguideforms
https://the-brandidentity.com/project/los-yorks-pixel-based-system-gives-netflixs-eyeline-a-bold-new-vision
Los York’s pixel-based system gives Netflix’s Eyeline a bold new vision — The Brand Identity...
pixel basedsystem giveslos
https://www.creativeboom.com/inspiration/kirkland-urban-rebrand/
People People crafts colourful identity based on building blocks for urban development | Creative...
The Seattle agency draws on modular and geometric forms to create striking new branding for Kirkland Urban, a mixed-use development in King County, Wa...
identity basedbuilding blocks
https://www.afcea.org/signal-media/software-overlay-provides-identity-based-security-layer-osi-model
Software Overlay Provides Identity-Based Security Layer to OSI Model | AFCEA International
provides identitysoftwareosi
https://community.f5.com/kb/technicalarticles/f5-big-ip-access-policy-manager-apm-identity-based-steering-with-ssl-orchestrato/313037
F5 BIG-IP Access Policy Manager (APM) Identity-based steering with SSL Orchestrator (SSLO)
Having the power of F5 APM as an Identity Aware Proxy and F5 SSLO allows to have a flexible organization-wide secure access layer.
big ipaccess policymanagerapm
https://ourworldindata.org/grapher/employment-discrimination-bans-lgbt
Employment discrimination based on sexual orientation or gender identity prohibited - Our World in...
employment discrimination
https://www.wionews.com/entertainment/lifestyle/kolkata-based-sarod-player-flees-bangladesh-hides-indentity-after-his-concert-venue-is-vandalised-in-dhaka-1766394094261
Kolkata-based Sarod player flees Bangladesh, hides identity after his concert venue is vandalised...
Dec 22, 2025 - Kolkata-based sarod player Shiraz Ali Khan had to flee Bangladesh after his concert venue in Chhayanaut was vandalised. Shiraz had a harrowing time on his...
kolkata basedsarod player
https://www.noemamag.com/purity-vs-plurality-in-india/
Modi's Hindu 'Civilization' Is Just Identity-Based Nationalism
Feb 7, 2023 - Narendra Modi’s brood of Hindu nationalists, while ostensibly rooting for a return of an Indian civilizational state, are in fact merely envisioning a...
identity basedmodihindu
https://www.netowl.com/
NetOwl® — AI-based Text Analytics and Identity Analytics for Big Data
May 9, 2024 - NetOwl is a suite of AI-based entity extraction, sentiment analysis, name matching, and identity resolution tools for Big Data
ai basedtext analytics
https://www.gieom.com/bahrain-based-islamic-retail-bank-goes-live-on-ai-powered-online-identity-verification-for-seamless-customer-onboarding/
Bahrain based Islamic retail bank goes live on AI-powered Online Identity Verification for Seamless...
Feb 22, 2025 - Right from the inception the bank understood the importance of customer experience and their objective was to allow their customers to open an account and
retail bankgoes livebahrain
https://www.keyshare.id/physical-access/
KeyShare for Physical Access — Identity-Based Building Access & Visitor Management
Eliminate mobile credential costs. Authorize people, not tokens. KeyShare runs on your existing Mercury panels and PACS software — no rip-and-replace.
physical accessidentity based
Sponsored https://www.tushyraw.com/
TUSHY RAW: Intense 4K Videos Featuring Raw Passion from Behind
TUSHY RAW delivers powerful scenes with stunning performers exploring their wild side. Shot in striking 4K, experience real chemistry and bold action from behind...
https://www.shiftleft.org/papers/gibe/
shiftleft.org — Generalized identity-based and broadcast encryption schemes
identity basedshiftleft
https://www.idsalliance.org/blog/from-aaa-to-assurance-how-the-uk-telecoms-security-act-is-shaping-identity-based-network-control/
From AAA to Assurance: How the UK Telecoms Security Act Is Shaping Identity-Based Network Control |...
Nov 5, 2025 - Learn what the UK TSA means for identity-based network control. Enforce least privilege, tie admin access to identity, and improve traceability.
security actaaaassuranceuk
https://mixmagmena.com/feature/meet-black-camel-records-the-dubai-based-label-set-to-fuse-sound-fashion-and-identity
Meet Black Camel Records: The Dubai-based label set to fuse sound, fashion and identity - Features...
dubai basedlabel setmeetblack
https://ourworldindata.org/grapher/employment-discrimination-lgbt-equaldex
Employment discrimination based on sexual orientation or gender identity - Our World in Data
Includes discrimination in hiring, promotion, termination and harassment at work. Only legal status considered, not enforcement.
employment discrimination
https://www.uwsuper.edu/student-life/get-involved/identity-based-organizations/
Identity-Based Organizations - UW Superior
organizations uw superior
https://curity.io/solutions/secure-iam-in-the-age-of-ai/
Secure AI with Identity-Based Access Control | Curity
based access controlsecure ai
https://www.keyfactor.com/blog/3-things-to-know-about-keyfactors-pki-based-identity-for-agentic-ai/
3 Things to Know About Keyfactor’s PKI-Based Identity for Agentic AI | Keyfactor
Nov 17, 2025 - Embrace AI safely with Keyfactor’s PKI foundation, where AI agents gain the same strong, auditable identity as humans and devices.
pki basedthingsknowidentity
https://www.novatiq.com/
Novatiq | Telco-Based Identity Solution
Novatiq is the only platform offering telco-based identity solutions for the open web. We unlock opportunities right across the ad ecosystem. Find out more...
based identitynovatiqtelco
https://intellectdiscover.com/content/journals/10.1386/ctl_00037_1
How do school-based ceremonies contribute to adolescents’ identity design? A case study in two...
This article discusses the contribution of school-based ceremonies in two Israeli Druze schools to shaping identity and deepening the sense of citizenship...
school basedidentity design
https://www.securew2.com/non-human-identity-access
EAP-TLS Machine Identity with Certificate-Based Auth | SecureW2
Oct 15, 2025 - EAP-TLS machine identity replaces shared secrets with X.509 certificates, securing devices and services through scalable, passwordless auth.
eap tlsmachine identitybased
https://www.genua.eu/press-article/genusphere-identity-based-and-application-specific-access-to-internal-applications-without-vpn
genusphere: Identity Based and Application Specific Access to Internal Applications without VPN
genusphere ensures that end users can only access applications approved for them via a browser - without a VPN. The centrally hosted software consistently...
identity basedgenusphere
https://playporngames.com/mindware-infected-identity/
MindWare: Infected Identity – Play Porn Games - Free HTML Porn Games and Text-Based Sex Stories
You play as a former freelance hacker, who has just become infected with a gender-altering mindware and now must find a way to deal with this problem.
mindware infected identity
https://delinea.com/blog/identity-security-solutions-and-ai-agents
Are Identity Security Tools Ready for an AI-based Workforce?
Adopting Agentic AI means addressing three unique challenges posed by these new agents. Here they are, and what to do about them.
identity securityai based
https://brite.com/identity-secured-how-itdr-combats-credential-based-attacks/
Identity Secured: How ITDR Combats Credential-Based Attacks | Brite
credential based attacksitdr
https://www.computerweekly.com/opinion/How-to-fend-off-identity-based-cyber-attacks
How to fend off identity-based cyber attacks | Computer Weekly
based cyber attacksfendweekly
https://saviynt.com/
Saviynt | AI-Based Identity Security and Access Management Platform Solutions
Saviynt's identity security platform secures and governs every identity - human, non-human, and AI agent - across your entire digital ecosystem.
access management platformai
https://connectedsocialmedia.com/423/plaxo-to-ship-online-identity-aggregator-based-on-microformats/
Plaxo to ship online identity aggregator based on microformats | Connected Social Media
shiponlineidentityaggregator