The 3-day internship program 

In my last blog post, I discussed the make-it-happen value among the three values of our team: make-it-happen, be DAO, and be transparent. Today I would like to write about the 3-day internship in our hiring process because the 3-day program provides excellent insights to both candidates and us. To …

Continue reading

The Make-It-Happen value for us

CollaboGate Three Values Our team had a discussion about our Company Deck yesterday we are building right now. There are three pillars of our core values, by design, that we respect as a team; 1. Make it happen, 2. Be DAO, and 3. Be transparent. We set these values to …

Continue reading

Let's automate device security provisioning

Today, I would like to share one of my personal experiences that brought us here, automate devise security provisioning with edge intelligence. Let's go back in 2015. I was in the development of a distributed system. It was a system to connect 3D printers to the cloud and the users …

Continue reading

Decentralized ID and the main stream of digital ID: What are the differences?

DID and the main stream of digital ID: What are the differences?

Our startup, CollaboGate, has released the first product, UNiD, decentralized identity platform on March 10, 2021. We are receiving a lot of responses from the audience who is reimagining digital experience. The days to design our decentralized architecture and build products are full of insights and we are excited to …

Continue reading

Overview of DID Standards & Specs

Organizations for standardization There are organizations that are important for those involved in building open standards for digital identity. Decentralized Identity Foundation (DIF) World Wide Web Consortium (W3C) Internet Engineering Task Force (IETF) Hyperledger (Aries | Ursa | Indy ) OASIS Kantara Initiative OpenID Foundation Trust Over IP Foundation (ToIP) …

Continue reading

New Identity Stack for the future Web

Intro to DID as the new identity stack for the future web

Digital Identity The traditional identity systems today are fragmented, insecure, and do not have sufficient functionality to verify whether the data transferred is reliable in human social activity. For example, when using digital services, we are always required to create accounts and store a small part of our digital identity …

Continue reading
Your cart