You’ve seen me blog a whole lot about Service-Oriented Security over the years; now you can also hear me talk about it. I’ll be doing a live webcast on “Service-Oriented Security: Blazing a New Trail of Innovation in Application Security” on Wednesday, August 25th (that’s tomorrow!) at 11:00 a.m. PT/2:00 p.m. ET . In it,
The ever thought-provoking Pamela Dingle has issued a challenge to Enterprise Application vendors. In it, she puts forth the idea that technology and market demand has reached the point where those in the business of building and selling enterprise applications should (must?) figure out how to externalize authentication. But she also points out what has
There has been an interesting discussion going on regarding the fate of metadirectory technology. Dave Kearns talked about it in his newsletter recently (see: Is the metadirectory dead). In it, he quoted Jackson Shaw, who brought it up as context to HP’s recent retrenchment: “Let’s be honest. The meta-directory is dead. Approaches that look like
I’m writing this on a flight from San Francisco to Los Angeles, because an unfortunate scheduling conflict means that this year, Oracle OpenWorld and the Gartner Identity & Access Management Summit overlap for two days in the middle of the week. So I am going to miss the first day at Gartner because I just
It took me a while to recover from last weeks Digital ID World conference. And it wasn’t just because of the mad scramble I went through at the last minute to update all my slides for my talk. That was just the side effect of spending too much time in some really interesting sessions and
You know you are at a good conference any time your keynote address throws up a picture of Neo (from The Matrix) on the screen. That’s exactly what Doc Searls did during a typically humorous and thought-provoking keynote roughly titled “The Decentralization of Identity” (actually re-titled in real time based on Phil Becker’s opening keynote)
A lot of people wait with bated breath for Gartner’s Magic Quadrant reports on various technologies to come out. And in a relatively new and evolving space like user provisioning, the report carries even more weight in influencing the consumer base. Gartner just published their report on User Provisioning, and for the second year in
After a day and a half, I can safely say that Catalyst is living up to its reputation of being on the cutting edge of identity trends and issues. After a typically boisterous start to the conference on Wednesday, where Mike Neuenschwander set the tone by introducing a superhero called “Captain Controls“, the conference settled
I attended the Project Concordia workshop yesterday, ahead of the Catalyst conference. I mentioned the project in a blog post last week; it has the worthy goal of trying to initiate efforts that make sense of the competing standards and methodologies that exist in the identity world. I found myself enjoying the kind of lively
It’s amazing how often we (and by “we” I mean those of us who deal with the high flying world of identity management) get brought back to earth by the reality of everyday life. Usually, this happens when someone asks such a simple and obvious question that we wonder how we overlooked it in the