Year: 2009

Burton Catalyst 2009: Waiting for the World to Change

In my last post, I talked about the SIG meetings that I attended prior to the conference actually starting. There was lots of good content and discussion, which continued on into the actual sessions. I had thought of splitting my time between the Identity and Cloud Computing (new to Catalyst this year) tracks. But the

Burton Catalyst 2009: The Twisted Web We Weave

I’m finally settling back into work after a wonderful week out in sunny San Diego at Burton Group‘s annual Catalyst Conference. And it wasn’t just the weather outside that was wonderful. Inside you could find some thought-provoking sessions, inspiring discussions and great people. It’s given me way too much to blog about, and I hope

The Twitter Break-In: Anything to learn here?

The answer is: Plenty. In a nutshell, here is what happened as I understand it: A hacker named Hacker Croll (who has been a pain in Twitter’s behind for a while now) was able to gain access to the Gmail accounts of various twitter employees, including founder Evan Williams. He was then able to use

Identity Proofing on Twitter – problems and potential

All the web has been abuzz recently about Twitters launch of Verified Accounts (read Mashable’s post about it here). The goal of the program is to be able to show a badge on a Twitter account that communicates to readers the authenticity of the twitter stream. The reason for Twitter doing this is to avoid

Now How Are We Supposed To Solve This?

Here is an interesting anecdote I heard yesterday (identity of person withheld for their own protection): My tween daughter was entering some sort of online popularity contest. It involved registering yourself as a contestant online with your email address, and then verifying your entry by clicking on a link in a verification email you would

Entitlement Management: More than meets the eye

Ian Yip just blogged his thoughts about what Entitlement Management means. It’s interesting to hear his take, because not too long ago, I participated in another discussion that was trying to define EM. Back then, the contention was that entitlement management and RBAC were essentially solutions to the same problem, setting off a “which one

The new Identity Equation

A few days ago, I tweeted about this CNET article that talks about the plans that Twitter has to expand their search service into what could be one of the most powerful real-time search engines anywhere. The key to this whole thing is the idea of reputation – that ephemeral quality that will improve the

Welcome to the new Talking Identity

I know I’ve been quiet for a while. In large part, I lay the blame at the doorstep of the almighty Twitter. It made it too easy for me to get my thoughts out there without having to put too much effort into it 🙂 But it is partly also because I have been working

Are Social Networks the biggest threat to User Privacy?

Privacy advocates have long been raising a hue and cry about the negative impact social networking sites are having on privacy. For the most part, the glare has been on the poor security practices and privacy controls of these sites. But now researchers at the University of Texas at Austin have brought to light a