Wednesday, July 06, 2005

Putting the who, what, when, where and how into context


NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
07/06/05
Today's focus: Putting the who, what, when, where and how into
context

Dear security.world@gmail.com,

In this issue:

* Context in identity transactions
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by DuPont
Limiting the Plenum Cable Fire Risks

Concerns are rising about the growing number of combustible
cables present in commercial buildings required to service the
ever-increasing demands of IT networks. More workstations are
taxing our infrastructure. These concerns are the thrust behind
new "limited combustible" cables that reduces fire safety risk.
Learn more by reading this white paper now.
http://www.fattail.com/redir/redirect.asp?CID=107800
_______________________________________________________________
WHAT YOU CAN DO TO PREVENT DATA-THEFTS?

For years, hackers have obtained confidential information by
manipulating legitimate users into revealing it. It's critical
that companies convey to their employees - local and remote -
why security measures are important. If you're curious to see
how your company's security efforts stack up, click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=107658
_______________________________________________________________

Today's focus: Putting the who, what, when, where and how into
context

By Dave Kearns

I can't seem to get away from the concept of "context." I like
to use "context" as a way of looking at identity transactions -
the who, what, when, where, how (and perhaps why) of an
authentication or authorization.

Michel Prompt, founder of Radiant Logic uses "context" in
reference to the identifiers associated with a particular
identity. He refers to different contexts where others might say
different "identities," or personas, aliases, pseudonyms,
avatars, or roles.

Archie Reed, HP's director of strategy for identity and access
management reminds me that he's used "context" since his days at
Trulogica (which was acquired by HP) to encompass both the
context of identifiers and the context of transactions.

And just last week the concept came up again. I attended the
inaugural Where 2.0 conference (
<http://conferences.oreillynet.com/where/> ) sponsored by the
O'Reilly organization, where I spoke with Stephen Lawler,
general manager of Microsoft's MapPoint Business Unit. He'd just
presented a demo of the recently announced, but not yet
released, MSN Virtual Earth Web product (see
<http://www.virtualearth.com/> for an introduction, then come
back when it goes live. It's really, really neat!).

He and I discussed his plans for the technology, data sources
and personalization. The latter he illustrated by proposing that
a search for a good restaurant might need to be within walking
distance for some users but would need to have adequate parking
facilities for others. I countered by saying that when I'm in
Boston, Manhattan or Chicago I'd like restaurants within walking
distance, but that this was an alien concept in Dallas or Los
Angeles, where driving is de rigueur in order to get anywhere.
That's when he mentioned "context."

According to Lawler, context, within the Virtual Earth project
means not only personal preferences, but also personal
preferences modified by location, time, and other factors - the
entire who (e.g., me, me and my wife, me and business
associates, etc.), what (restaurant, Italian restaurant, coffee
shop, Starbucks, etc.), where (Boston, Harvard Square,
Massachusetts, etc.), when (lunch, dinner, Sunday, Spring, etc.)
and how (walk, drive, mass transit, etc.).

Both Google and Yahoo also presented new functionality for their
mapping services at Where 2.0. All three companies unveiled
plans for easier to use programming interfaces so that the
entrepreneurial hacker could leverage the services to create
new, exciting products. Location services, mapping services,
local search - these are the consumer-based "killer apps" for
Web services. And it appears that the real neat thing is that
the most effective services will be built on an identity-based
platform. We do live in interesting times.
_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by DuPont
Limiting the Plenum Cable Fire Risks

Concerns are rising about the growing number of combustible
cables present in commercial buildings required to service the
ever-increasing demands of IT networks. More workstations are
taxing our infrastructure. These concerns are the thrust behind
new "limited combustible" cables that reduces fire safety risk.
Learn more by reading this white paper now.
http://www.fattail.com/redir/redirect.asp?CID=107800
_______________________________________________________________
ARCHIVE LINKS

Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
The dynamic world of application acceleration technologies

Companies are undergoing a shift in the way they structure their
internal IT departments and external service components. Find
out about the changing market for application acceleration
technologies.
http://www.fattail.com/redir/redirect.asp?CID=107598
_______________________________________________________________
FEATURED READER RESOURCE
FOCUS ON RECOVERY

IT professionals are changing the way they back up and recover
data, experts say, with new emphasis on the speedier fetching of
data made possible by advancing technologies. At a recent
storage conference in Orlando, disk-based backup solutions were
touted - find out if attendees agreed and if faster storage
solutions will soon be available. Click here:
<http://www.networkworld.com/news/2005/062005-data-recovery.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment