Eric looks at the recent Gartner list of "actions" for IT professionals, and finds that it may point to a much larger context.
Digital ID World
There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the second article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.
This piece by Robert Young (on Om Malik's blog) caught my eye this morning. The blog entry outlines why social networks are the "new media," but it does so by highlighting the importance of digital identities.
There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the first article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.
Web 2.0 functionalities are being built without addressing the big elephant in the corner -- identity.
On Wednesday, at the Syndicate conference, VeriSign released the beta version of their Personal Identity Provider. This is a significant advance in the world of "URL-based identity."
Most people only look into new technologies or methods when they think they are nearing critical mass in deployment and/or usability. Where is identity on this curve, and how can we measure its progress on the various trend lines that matter?
Strong Authentication has become an issue of "risk management." Traditionally, authentication has been a binary problem with a binary answer -- you are or are not authenticated...
A lot of time and money has been spent on location based security technology (firewalls, intrusion detection, etc.) Only recently, however, is the realization slowly dawning that these techniques were doomed from the start and a different approach is needed to solve the problems.
In response to my posting this morning about Symantec coming around to identity management ("Security is like Love"), a commenter asks, "What about Cisco?"