Eclipse finally delivers its Higgins open source identity framework The average gestation period for a human baby is nine months. The average gestation period for an elephant is just a tad under two years. But that's almost instantaneous when compared to a software project. Still, after ... Venues for enterprise identity practitioners Last week's Internet Identity Workshop (IIW) was, as always, the hotbed of user-centric identity, privacy protection, open source identity and social networking data exchange. As the meeting's charter reads: "The heart ... Eclipse, Novell near 'Big Bang' for identity Two open source identity management projects Monday said?that they had achieved a key milestone in the development of open source identity services that connect products regardless of maker or platform. Novell details modular infrastructure plan Novell Monday laid out a technical strategy that would let users mix and match physical and virtual machines along with management tools, identity services, collaboration software, and open source operating systems. 17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats. Plus: 17 High-Risk Security Threats (And How to Fix Them) How to Stop Operating-System Attacks How to Lock Down the Data in Your Apps How to Safeguard Your Online Security How to Beat Card Skimmer Scams, Other Money Drains How to Plug Security Holes in Your Browser How to Keep Your Cell Phone Info Private How to Protect Your Online Passwords Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment