User Attributes – Part of Identity?
I recently participated in an Identity and Access Management architecture session where I was asked a direct question, “Do you consider user attributes not stored in the main directory a part of user...
View ArticleResurrecting Discovering Identity on Blogs.Oracle.Com
In response to requests that I refresh my Discovering Identity blog that has been lying dormant on blogs.oracle.com since February 2010, I have commenced today to satisfy that request. I created this...
View ArticleRichfield High School, Class of 1971 – Do I Know You?
Recently, I have received several invitations to join the “schoolFeed by Classmates” app on Facebook – from people I knew and went to school with in Richfield, Idaho, many years ago. I am very, very...
View ArticleIdentity is the Foundation
I enjoyed reading Ian Yip’s blog post this morning: “Identity is the Foundation.” The heart of the message: We need to be stating the fact that Identity is foundational to the enterprise. i.e. Identity...
View ArticleIdentities and Relationships: Enable and Protect
My thoughts for this post were triggered primarily by two items – me beginning to read “Emergence of the Relationship Economy” and reading Nishant Kauskik’s tweet Monday: Is Identity The New...
View ArticleIdentities and Relationships
In line with my post yesterday about viewing identities and relationships from the vantage points of “enabling” and “protecting,” I created three diagrams to illustrate how relationships between people...
View ArticleRelationship Value
In the book “The Emergence of the Relationship Economy,” Jay Deragon proposes that: The value of the relationship is categorized into four elements of the individual, and may be of one dimension or a...
View ArticleGraphs of Identities
Some interesting ideas are swirling in my mind in response to Ian Glazer’s challenge, “Killing IAM in Order to Save It” and Dave Kearn’s article “Pervasive and Ubiquitous Identity.” Whether or not we...
View ArticleIdentity Relationship Diagrams
Searching back through the archives, I realized that I had first used the term “Identity Relationship Diagram” in a blog post on July 21, 2005. I stated then: In the discipline of database design,...
View Article#MobileIDM Tweet Chat Archive
Last Week, on Thursday, March 7th, the second @OracleIDM Tweet Chat (AKA Tweet Jam) was held. It was great to participate with many others on this lively and informative chat. The Chat Archive for...
View Article#YellowJeepJourney: Identity, IoT, Mobile, Social and Cloud
I recently launched a personal web site and blog, Yellow Jeep Journey, to provide a personal canvas where I can document my efforts to reach an aggressive weight loss goal, and more importantly, share...
View ArticleYellow Jeep Technology Convergence
Recently, I blogged about my interest in leveraging five major converging technologies (Identity, Internet of Things, Mobile, Social and Cloud) to transform my Yellow Jeep into a rolling laboratory,...
View ArticleYellow Jeep Technology Convergence – Take 2
Recently, I posted a diagram illustrating the convergence of technology for the Yellow Jeep Journey After further thought, I believe the following diagram is a bit more accurate. By separating Social...
View ArticleIdentity Management: Securing Information in the HIPAA Environment
Next Thursday, January 21st, I will be giving a presentation at the Sun Horizons conference, “Healthcare Integration Through a New Perspective.” My topic will be “Identity Management: Securing...
View ArticleThe Value of Data and Meaningful Analytics
Semantics: “The study of meaning” This morning I read a thought-provoking article by my associate Mark Montgomery entitled “Systemic failures, by design.” The article proposes that in many high-profile...
View ArticleIdentity-Enabled Patient Consent Management
Last Thursday, January 21st, I gave a presentation at the Sun Horizons conference, “Healthcare Integration Through a New Perspective.” The title of my talk was “Identity Management: Securing...
View ArticleUsers of Cloud-based Services
The following chart may be helpful as we consider the different types of users that should be addressed by Identity and Access Management (IAM) technology and processes in cloud computing. At the...
View ArticleIdentity Services for Cloud Computing
To support recent discussions about Identity Management and Cloud computing, I divided the types of Identity Services that might be needed to support Application services into three major categories as...
View ArticleBusiness Value vs. Speeds & Feeds
I had a conversation with a colleague this morning about the tension between two sales approaches: Focusing on business value derived from implementation certain technology Focusing on technical...
View ArticleLove and Forgery
I received the following email forward from by brother-in-law this week. If the story isn’t true, it is quirky enough that it deserves to be: Running stop light = $100.00 DUI = $5000.00 Not wearing a...
View Article
More Pages to Explore .....