Eric Norlin

Latest Posts

A Band-aid for the identity problem

A Band-aid for the identity problem

Want to know where a great business opportunity lies? Just watch the existing technology companies that are suddenly all offering things in that space. Of course, those opportunities lie everywhere, but recently you may have noticed a spate of offerings from Microsoft and Check Point, with more coming from Symantec and McAffee.

June 5, 2006 by in Enterprise Software

Top 5 Identity Fallacies: #1 We'll Add It In Later

Top 5 Identity Fallacies: #1 We'll Add It In Later

There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the first article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.

May 25, 2006 by in Developer

Reaching Critical Mass

Reaching Critical Mass

Most people only look into new technologies or methods when they think they are nearing critical mass in deployment and/or usability. Where is identity on this curve, and how can we measure its progress on the various trend lines that matter?

May 16, 2006 by in Amazon

Doomed from the start

Doomed from the start

A lot of time and money has been spent on location based security technology (firewalls, intrusion detection, etc.) Only recently, however, is the realization slowly dawning that these techniques were doomed from the start and a different approach is needed to solve the problems.

May 10, 2006 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All

Most Popular