Unfortunately "Proof of Concept" (POC), "Prototype", and "Pilot" are used interchangeably, though I think they mean different things and serve very different functions. Successful projects should implement all of these consciously/deliberately....
About Me:

Hello and welcome to my website!
My name is Parvez Naqvi, and I’m a seasoned cloud and security-focused technologist, business leader, and philanthropist with extensive experience in the technology and finance.
I hold a Bachelor’s degree in Computer Science from India and a Master’s degree in Business Administration (MBA) from The Wharton School of the University of Pennsylvania. My academic background has equipped me with the technical and business skills necessary to succeed in today’s fast-paced, constantly evolving business environment.
Over the course of my career, I’ve held a variety of roles in the technology and finance sectors, working for several large companies and financial institutions. I started out as a software developer, working on a range of projects in different industries. I then transitioned into role focused on Executive leadsership Cybersecurity, Idenity Access Management and Cloud Migration.
Throughout my career, I’ve been committed to giving back to society and supporting various charitable causes and initiatives.
As a business leader, I’m known for my strategic thinking, problem-solving abilities, and entrepreneurial spirit. I’m passionate about identifying new opportunities, building high-performing teams, and driving growth and profitability. I’m also a strong communicator and collaborator, able to work effectively with people from diverse backgrounds and cultures.
In my free time, I enjoy traveling, spending time with my family, gardening, and staying active through various sports and outdoor activities (Skiing, Hiking, & Golf).
Patent Granted – A Method and System for Click-Thru Capacity in Electronic Media
Better Late Than Never!!! Patent Target: Content Systems and products (Data transparency and auditability for content – from raw data collection to customer desktop delivery) Executive Summary: Data (numbers) customers often see on our products...
Google’s TensorFlow is now an Open Source Software Library for Machine Intelligence
https://youtu.be/oZikw5k_2FM Google Machine Intelligence research organization’s Google Brain Team just open-sourced TensorFlow. TensureFlow is a machine learning library used across Google to apply deep learning to different areas. It's very good...
Radical and Incremental Innovation
Yes, Old topics die hard! I was re-reading some old articles about types of innovations, and measuring the effectiveness of different project investments and thought of posting this to the wider community to get some help & feedback. Radical /...
Identity Federation Design Patterns: 6 – Integration with a Central IAM
Like previous post, let’s assume that a Product 1 user is given access to Product 2 (product or services) and we want to provide this customer with an integrated product experience. In this design pattern we enable this single sign-on experience by...
Identity Federation Design Patterns: 5 – Integration without IAM
Let us assume that a Product 1 user is given access to Product 2 (product or services) and we want to provide this customer an integrated product experience. There are multiple design patterns which can enable this single sign-on experience. These...
Identity Federation Design Patterns: 4 – “OAuth” – Open Authorization
The OAuth protocol version 2.0 (“OAuth2”) was mainly created to remove the need for users to share their passwords with third-party applications. OAuth2 is mainly used for delegating access to some external entity. You are basically allowing...
Identity Federation Design Patterns: 3 – SAML
SAML is an OASIS standard used to exchange authentication and authorization data between two parties. SAML uses an XML format to share information about who a user is and what they are allowed to do. Authorization data is included in a set of...
Identity Federation Design Patterns: 2 – Introduction
Across the industry, many companies are implementing new, hosted Identity and Access Management Service ("IAM") that will be used by all the products to authenticate customers accessing our services. The Identity service will provide a central...
Identity Federation Design Patterns: 1 – Executive Summary
Companies have dozens of different systems that contain customer identity data and these systems are used by more than hundreds of products. Having multiple identity systems not only limits the ability to leverage assets easily across the...
Benefits of Identity and Access Management as Corporate Service
Customer identity management is one of the foundational elements of every single product across business units. Instead of various products across the organization building and maintaining their identity systems (which they often do), the company...
Wharton Graduation Day!
Life won't be the same without these three and I won't be able to graduate without their support! The school said its the graduation celebration, but to me it was all about celebrating the sacrifices they made to help me get here!!!