Date Range
Date Range
Date Range
Identity Management and Information Security. software, services, process and analysis. A Few Thoughts on Privacy in the Age of Social Media. Everyone already knows there are privacy issues. About leaked personal photos and the Snappening. We know there are bad people out there who will attempt to hack their way into our personal data.
After eight and a half years at Ping Identity. Some of my favorite PingIdentians. My other incredible windfall has been to meet brilliant and talented customer architects. They have taught me so much about the bigger picture, the reality that all the vision has to fit into, before it can resonate.
Sunday, July 27, 2014. Time To Kill RBAC In Order To Save It? I know this is a controversial position that will likely attract some fire from some of my peers in the IAM geek-space, so allow me to explain. By design, role compositions and assignments tend to be static, but we now live in a world where privilege needs are not. The current standard for RBAC has remained mostly unch.
Reflections, musings and ideas about identity and access management. Saturday, August 10, 2013. Nothing is scarier than a business user with a credit card - collaboration. Could the same thing happen in the US? I would say perhaps so perhaps it is time to consider alternatives to sending all your docs to a US based company if you yourself is non US based. There are a number of pages such as Prism break. And is marketed by Cloud Distribution.
Oracle Identity Administration and Access Governance. Featuring experts from Kaiser Permanente, PricewaterhouseCoopers and Oracle. Key security and regulatory requirements in healthcare establishments.
The coming collapse of surveillance marketing. In June 2015, I gave a commencement address to the graduating class of High Mowing School in New Hampshire. I wrote many drafts for the talk, all toward extemporizing the final thing. My experience with Linux and open-source hackers had an influence on it and gets credit as well. What should we call the selling of our digital body parts? Doc Searls Weblog Doc Searls Weblog.
Identity Management, Access Management. Thursday, February 07, 2013. Should CMOs Fund the Next Generation of Identity Management? Cross posted at blog. What does marketing have to do with cloud Identity Management? Quite a bit, it seems. The result? The rather obvious.
Jacksons Identity Management and Active Directory Reality Tour Travelblog. Wednesday, March 27, 2013. ADFS is a Four Letter Word. In a recent blog post over at Okta they liken ADFS to be a four letter bad word. You can read the article.
Database, Fusion Middleware, Identity Management, and Information Architecture. The Oracle Exadata software 11. This patch includes all fixes and enhancements included up to release 11. 2, any fixes and enhancements thereafter up to this release.
10 ways to boost your superpowers! This gallery contains 8 photos. 10 tips for special mums. This gallery contains 7 photos.
How to watch Doctor Who. Cori of all people asked me yesterday if we should watch Doctor Who. But if one was to start. where do you start watching? A few folks have said starting 2005 would be good.
On February 16, 2018. 2018 seventeen people were murdered during a school shooting. School shootings are horrific, but they are not the way most victims of gun violence die. I know that it will not be that long before I am writing about another mass shooting; people will move on to other things, as they always do, and the malign neglect of the problem will persist.
This is your first post. Edit or delete it, then start blogging! July 4, 2015.
مطالب خواندنی درباره ایران و پرشیا. مطالب خواندنی درباره ایران و پرشیا.