<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 22:39:36 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/identitymanagement/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Blockchain for Identity Management]]></title><description><![CDATA[Blockchain enables the creation of a trustless and verifiable identity verification process. This technology has the potential to revolutionize identity management by providing a secure, decentralized,]]></description><link>http://direct.ecency.com/hive-167922/@kawsar8035/blockchain-for-identity-management</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@kawsar8035/blockchain-for-identity-management</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[kawsar8035]]></dc:creator><pubDate>Mon, 08 Jan 2024 12:31:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHnz49jMjPMDbrzQY5JrwBkKdskfCZmxN6YbFiSh6o8pQAAetpRAbKtyeRd4gRoTC8GNZAjrVhJXd2oP9XSZyDtLAp3LB1jai6sWh3nJwtnexK5J1Rsc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[TechDemocracy Commercial Video]]></title><description><![CDATA[TechDemocracy is a trusted cybersecurity solutions provider with our core focus in Identity Security and Cyber Risk & Governance. As a global company, we provide a full suite of IT solutions - ranging]]></description><link>http://direct.ecency.com/hive-101202/@techdemocracy/tpgqtukj</link><guid isPermaLink="true">http://direct.ecency.com/hive-101202/@techdemocracy/tpgqtukj</guid><category><![CDATA[hive-101202]]></category><dc:creator><![CDATA[techdemocracy]]></dc:creator><pubDate>Thu, 29 Sep 2022 13:58:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwr5bsMXthzYLbcngN4W2P8NtU9TWTdHC3HaQbjuuRfHesJoVxaceWzDtKFihtjtd5HqW8mEAgzg5jEkb4ZmYAdTcLZ1b6Bbvqz9C4QewmLeVeFmzJNPSVEJJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Introducing Facial Recognition]]></title><description><![CDATA[This is one of those typical scenes in movies that Facial Recognition (FR) is put into action. For those using Facebook, you will also recall that Facebook automatically tagged the name of faces in the]]></description><link>http://direct.ecency.com/facialrecognition/@sunnytan/rdcgr-introducing-facial-recognition</link><guid isPermaLink="true">http://direct.ecency.com/facialrecognition/@sunnytan/rdcgr-introducing-facial-recognition</guid><category><![CDATA[facialrecognition]]></category><dc:creator><![CDATA[sunnytan]]></dc:creator><pubDate>Mon, 22 Jul 2019 23:41:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP5JbjLXEzZ423c4b1ZxKZb89s8J8e6S6o3mX2eCVgKrcgAHvHRQDHiHHbwr4J19fuHk6M4dnXx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Introducing Facial Recognition]]></title><description><![CDATA[This is one of those typical scenes in movies that Facial Recognition (FR) is put into action. For those using Facebook, you will also recall that Facebook automatically tagged the name of faces in the]]></description><link>http://direct.ecency.com/facialrecognition/@sunnytan/introducing-facial-recognition</link><guid isPermaLink="true">http://direct.ecency.com/facialrecognition/@sunnytan/introducing-facial-recognition</guid><category><![CDATA[facialrecognition]]></category><dc:creator><![CDATA[sunnytan]]></dc:creator><pubDate>Mon, 22 Jul 2019 00:26:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP5JbjLXEzZ423c4b1ZxKZb89s8J8e6S6o3mX2eCVgKrcgAHvHRQDHiHHbwr4J19fuHk6M4dnXx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Identity Management Implementation Guide - Key Terms and Definitions]]></title><description><![CDATA[Identity and Access Management (IAM) programs define standard controls to ensure endpoint systems are designed, configured, and managed to preserve the confidentiality, integrity, and availability of]]></description><link>http://direct.ecency.com/identitymanagement/@hannoekdahl/identity-management-implementation-guide-key-terms-and-definitions</link><guid isPermaLink="true">http://direct.ecency.com/identitymanagement/@hannoekdahl/identity-management-implementation-guide-key-terms-and-definitions</guid><category><![CDATA[identitymanagement]]></category><dc:creator><![CDATA[hannoekdahl]]></dc:creator><pubDate>Mon, 22 Aug 2016 18:53:12 GMT</pubDate></item></channel></rss>