Over 2 months ago (wow, time really flies when you are trying to keep up with the Twitter firehose), I wrote an introductory post to a topic that I am beginning to examine in some detail – the impact Cloud Computing will have on Identity Management. Back in May, I tweeted that I believe cloud
A few weeks ago, while I was at Catalyst, I read an article about the marines banning the use of social media. The policy on social media usage is far from consistent within our armed forces, as revealed in this Stars and Stripes story that shows just how confused and divided the policy makers are:
After a good start to the conference, I went into day 2 thinking that there was going to be more opportunity for me to blog while in the session room because the content would be fairly familiar. But there were lots of good nuggets of information spread throughout the talks, enough to generate a generous
In my last post, I talked about the SIG meetings that I attended prior to the conference actually starting. There was lots of good content and discussion, which continued on into the actual sessions. I had thought of splitting my time between the Identity and Cloud Computing (new to Catalyst this year) tracks. But the
I’m finally settling back into work after a wonderful week out in sunny San Diego at Burton Group‘s annual Catalyst Conference. And it wasn’t just the weather outside that was wonderful. Inside you could find some thought-provoking sessions, inspiring discussions and great people. It’s given me way too much to blog about, and I hope
The answer is: Plenty. In a nutshell, here is what happened as I understand it: A hacker named Hacker Croll (who has been a pain in Twitter’s behind for a while now) was able to gain access to the Gmail accounts of various twitter employees, including founder Evan Williams. He was then able to use
This is the introductory post in a series I hope to write regarding Identity Management and Cloud Computing, leading up to a talk I will be giving at Oracle OpenWorld on the topic (details to come). But before we dive into the topic, I do need to lay some groundwork around some relevant concepts. What
All the web has been abuzz recently about Twitters launch of Verified Accounts (read Mashable’s post about it here). The goal of the program is to be able to show a badge on a Twitter account that communicates to readers the authenticity of the twitter stream. The reason for Twitter doing this is to avoid
Here is an interesting anecdote I heard yesterday (identity of person withheld for their own protection): My tween daughter was entering some sort of online popularity contest. It involved registering yourself as a contestant online with your email address, and then verifying your entry by clicking on a link in a verification email you would
Ian Yip just blogged his thoughts about what Entitlement Management means. It’s interesting to hear his take, because not too long ago, I participated in another discussion that was trying to define EM. Back then, the contention was that entitlement management and RBAC were essentially solutions to the same problem, setting off a “which one