Eric Norlin

Latest Posts

A Band-aid for the identity problem

A Band-aid for the identity problem

Want to know where a great business opportunity lies? Just watch the existing technology companies that are suddenly all offering things in that space. Of course, those opportunities lie everywhere, but recently you may have noticed a spate of offerings from Microsoft and Check Point, with more coming from Symantec and McAffee.

published June 5, 2006 by

Comments

Novell: Focus, Grasshopper.

Novell: Focus, Grasshopper.

Novell released its quarterly earnings yesterday, and some in the press are calling them "disappointing." Of course, that's what I notice -- but first to the numbers...

published June 1, 2006 by

Comments

There's a user in there somewhere

There's a user in there somewhere

This piece by Robert Young (on Om Malik's blog) caught my eye this morning. The blog entry outlines why social networks are the "new media," but it does so by highlighting the importance of digital identities.

published May 30, 2006 by

Comments

Top 5 Identity Fallacies: #1 We'll Add It In Later

Top 5 Identity Fallacies: #1 We'll Add It In Later

There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the first article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.

published May 25, 2006 by

Comments

Reaching Critical Mass

Reaching Critical Mass

Most people only look into new technologies or methods when they think they are nearing critical mass in deployment and/or usability. Where is identity on this curve, and how can we measure its progress on the various trend lines that matter?

published May 16, 2006 by

Comments

Doomed from the start

Doomed from the start

A lot of time and money has been spent on location based security technology (firewalls, intrusion detection, etc.) Only recently, however, is the realization slowly dawning that these techniques were doomed from the start and a different approach is needed to solve the problems.

published May 10, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories