Federated Identity: The Missing Link

With the new OpenID Connect for Identity Assurance standard out in draft there is only one puzzle piece remaining to fit to fully realize distributed identity management: an electronically verifiable trust registry of Identity Providers.  And the Kantara Initiative is poised to provide it. To fully realize dynamic interoperability a user new to a digital … Continue reading Federated Identity: The Missing Link

Five Key Technology Themes Which Will Shape the Coming Decade, Part 2: Emergence of the Individual Narrative

This is the second in a series of posts (first, next, previous) in which I am exploring five key technology themes which will shape our work in the coming decade: The Emergence of the Individual Narrative;The Increasing Perfection of Information;The Primacy of Decision Contexts;The Realization of Rapid Solution Development;The Right-Sizing of Information Tools. In today's … Continue reading Five Key Technology Themes Which Will Shape the Coming Decade, Part 2: Emergence of the Individual Narrative

Your Knowledge Strategy: And Magic Filled the Air

In my last post, 'You Don't Need a Data Strategy, You Need A Knowledge Strategy,' I painted a high level sketch of why we need knowledge strategies, and the key features they need to address. I skipped ahead pretty quickly, rambling on<the time is now to sing my song /Zep> to cover a breadth of … Continue reading Your Knowledge Strategy: And Magic Filled the Air

The CONQUER Architecture for Distributed Systems, Part 1 of Probably Too Many but Hopefully Just Enough

Some time between 2010 and 2013 I began thinking differently about integration, both among components of distributed applications and among distributed applications per se. I know the rough time span because I published an integration reference architecture here in 2010 that did not feature the new ideas, and one in 2013 that did - well, … Continue reading The CONQUER Architecture for Distributed Systems, Part 1 of Probably Too Many but Hopefully Just Enough

Informational Identities and Personal Privacy: Persistence and Use

This post is one in an ongoing series (starting here) in which I am developing the concept of 'Informational Identity'. Your name, your legal identities, your digital identities, are all the same kind of thing:  information tools created to pick you out of a crowd, to refer to you when you are not present, to … Continue reading Informational Identities and Personal Privacy: Persistence and Use

Informational Identities and Personal Privacy: Instrumentation, Observation and Reporting

This post is one in an ongoing series (starting here) in which I am developing the concept of 'Informational Identity'. Your name, your legal identities, your digital identities, are all the same kind of thing:  information tools created to pick you out of a crowd, to refer to you when you are not present, to … Continue reading Informational Identities and Personal Privacy: Instrumentation, Observation and Reporting

Personal Identity Snapshots in Informational Identities

This post is one in an ongoing series (starting here) in which I am developing the concept of 'Informational Identity'. Your name, your legal identities, your digital identities, are all the same kind of thing:  information tools created to pick you out of a crowd, to refer to you when you are not present, to … Continue reading Personal Identity Snapshots in Informational Identities