Quantcast
Channel: Identity – Discovering Identity
Browsing all 69 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

User Attributes – Part of Identity?

I recently participated in an Identity and Access Management architecture session where I was asked a direct question, “Do you consider user attributes not stored in the main directory a part of user...

View Article



Image may be NSFW.
Clik here to view.

Resurrecting Discovering Identity on Blogs.Oracle.Com

In response to requests that I refresh my Discovering Identity blog that has been lying dormant on blogs.oracle.com since February 2010, I have commenced today to satisfy that request. I created this...

View Article

Image may be NSFW.
Clik here to view.

Richfield High School, Class of 1971 – Do I Know You?

Recently, I have received several invitations to join the “schoolFeed by Classmates” app on Facebook – from people I knew and went to school with in Richfield, Idaho, many years ago.  I am very, very...

View Article

Image may be NSFW.
Clik here to view.

Identity is the Foundation

I enjoyed reading Ian Yip’s blog post this morning: “Identity is the Foundation.” The heart of the message: We need to be stating the fact that Identity is foundational to the enterprise. i.e. Identity...

View Article

Image may be NSFW.
Clik here to view.

Identities and Relationships: Enable and Protect

My thoughts for this post were triggered primarily by two items – me beginning to read “Emergence of the Relationship Economy”  and reading Nishant Kauskik’s tweet Monday: Is Identity The New...

View Article


Image may be NSFW.
Clik here to view.

Identities and Relationships

In line with my post yesterday about viewing identities and relationships from the vantage points of “enabling” and “protecting,” I created three diagrams to illustrate how relationships between people...

View Article

Image may be NSFW.
Clik here to view.

Relationship Value

In the book “The Emergence of the Relationship Economy,” Jay Deragon proposes that: The value of the relationship is categorized into four elements of the individual, and may be of one dimension or a...

View Article

Image may be NSFW.
Clik here to view.

Graphs of Identities

Some interesting ideas are swirling in my mind in response to Ian Glazer’s challenge, “Killing IAM in Order to Save It” and Dave Kearn’s article “Pervasive and Ubiquitous Identity.” Whether or not we...

View Article


Image may be NSFW.
Clik here to view.

Identity Relationship Diagrams

Searching back through the archives, I realized that I had first used the term “Identity Relationship Diagram” in a blog post on July 21, 2005. I stated then: In the discipline of database design,...

View Article


Image may be NSFW.
Clik here to view.

#MobileIDM Tweet Chat Archive

Last Week, on Thursday, March 7th, the second @OracleIDM Tweet Chat (AKA Tweet Jam) was held. It was great to participate with many others on this lively and informative chat. The Chat Archive for...

View Article

Image may be NSFW.
Clik here to view.

#YellowJeepJourney: Identity, IoT, Mobile, Social and Cloud

I recently launched a personal web site and blog, Yellow Jeep Journey,  to provide a personal canvas where I can document my efforts to reach an aggressive weight loss goal, and more importantly, share...

View Article

Image may be NSFW.
Clik here to view.

Yellow Jeep Technology Convergence

Recently, I blogged about my interest in leveraging five major converging technologies (Identity, Internet of Things, Mobile, Social and Cloud) to transform my Yellow Jeep into a rolling laboratory,...

View Article

Image may be NSFW.
Clik here to view.

Yellow Jeep Technology Convergence – Take 2

Recently, I posted a diagram illustrating the convergence of technology for the Yellow Jeep Journey  After further thought, I believe the following diagram is a bit more accurate.  By separating Social...

View Article


Image may be NSFW.
Clik here to view.

Identity Management: Securing Information in the HIPAA Environment

Next Thursday, January 21st, I will be giving a presentation at the Sun Horizons conference, “Healthcare Integration Through a New Perspective.”  My topic will be “Identity Management: Securing...

View Article

Image may be NSFW.
Clik here to view.

The Value of Data and Meaningful Analytics

Semantics: “The study of meaning” This morning I read a thought-provoking article by my associate Mark Montgomery entitled “Systemic failures, by design.” The article proposes that in many high-profile...

View Article


Image may be NSFW.
Clik here to view.

Identity-Enabled Patient Consent Management

Last Thursday, January 21st, I gave a presentation at the Sun Horizons conference, “Healthcare Integration Through a New Perspective.”  The title of my talk was “Identity Management: Securing...

View Article

Image may be NSFW.
Clik here to view.

Users of Cloud-based Services

The following chart may be helpful as we consider the different types of users that should be addressed by Identity and Access Management (IAM) technology and processes in cloud computing. At the...

View Article


Image may be NSFW.
Clik here to view.

Identity Services for Cloud Computing

To support recent discussions about Identity Management and Cloud computing, I divided the types of Identity Services that might be needed to support Application services into three major categories as...

View Article

Image may be NSFW.
Clik here to view.

Business Value vs. Speeds & Feeds

I had a conversation with a colleague this morning about the tension between two sales approaches: Focusing on business value derived from implementation certain technology Focusing on technical...

View Article

Image may be NSFW.
Clik here to view.

Love and Forgery

I received the following email forward from by brother-in-law this week.  If the story isn’t true, it is quirky enough that it deserves to be: Running stop light = $100.00 DUI = $5000.00 Not wearing a...

View Article
Browsing all 69 articles
Browse latest View live




Latest Images