{"id":1631,"date":"2016-07-04T09:59:21","date_gmt":"2016-07-04T14:59:21","guid":{"rendered":"https:\/\/www.identityblog.com\/?p=1631"},"modified":"2016-07-04T15:03:49","modified_gmt":"2016-07-04T20:03:49","slug":"keynote-on-laws-of-identity-at-iiw","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1631","title":{"rendered":"Keynote on Laws of Identity at IIW"},"content":{"rendered":"<p>This year\u00a0<a title=\"Phil WIndley\" href=\"https:\/\/www.linkedin.com\/in\/windley\" target=\"_blank\">Phil Windley<\/a>\u00a0asked me to give\u00a0&#8220;the opening\u00a0keynote&#8221; at the <a title=\"IIW\" href=\"http:\/\/www.internetidentityworkshop.com\/\" target=\"_blank\" class=\"broken_link\">Internet Identity Workshop (IIW)<\/a> conference in Mountain View CA.\u00a0\u00a0I was a little skeptical&#8230;<\/p>\n<p>If you haven&#8217;t attended,\u00a0the IIW is\u00a0the perfect &#8220;un-conference.\u00a0 It <em>has no keynotes<\/em> or panels, it&#8217;s about getting stuff done.&#8221;\u00a0\u00a0Besides that,\u00a0everyone doing anything leading edge\u00a0in digital identity\u00a0attends as often as they can &#8211; it&#8217;s a place to collaborate and a Who&#8217;s Who of experts.\u00a0 Why keynote them?<\/p>\n<p>But\u00a0Phil explained there were many attending the conference who were\u00a0new to\u00a0Identity and didn&#8217;t\u00a0have any context\u00a0or way to grasp what people working in the area had already been through.\u00a0 So he asked me to talk about &#8220;The <a title=\"Laws of Identity\" href=\"https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf\">Laws of Identity <\/a>10 years later&#8221;.<\/p>\n<p>The &#8220;later&#8221; was intriguing.\u00a0 It gave me the opportunity to\u00a0share what we had learned 10 years ago, and then\u00a0begin to discuss what we have learned since.\u00a0 I&#8217;ve been wanting\u00a0the chance to get a conversation going about that, so I agreed to take the risk of breaking the no-keynote taboo.<\/p>\n<p>As the day of the\u00a0conference approached, I saw there was no mention of\u00a0a keynote\u00a0in the conference materials, and\u00a0began to\u00a0dread\u00a0being booed out of Mountain View for\u00a0doing a\u00a0keynote in a sacred place&#8230;\u00a0\u00a0Anyway I forsook\u00a0slides\u00a0(what a liberating experience!) and just jotted down a few notes in case the keynote (an un-keynote?) actually took place.\u00a0 Which it did &#8211; and those in the audience were more than gracious.\u00a0 It led to\u00a0great conversations with people approaching identity in new ways,\u00a0including conversations about one\u00a0of my big new interests:\u00a0 blockchain.<\/p>\n<p>I thought the best way to share the experience is by sharing\u00a0the Kim Cameron IIW twitter feed.\u00a0 So here goes:<\/p>\n<div class=\"storify\"><iframe src=\"\/\/storify.com\/kim_cameron\/keynote-at-iiw\/embed?border=false\" width=\"100%\" height=\"750\" frameborder=\"no\"><\/iframe><script src=\"\/\/storify.com\/kim_cameron\/keynote-at-iiw.js?border=false\"><\/script><noscript>[&amp;lt;a href=&#8221;\/\/storify.com\/kim_cameron\/keynote-at-iiw&#8221; target=&#8221;_blank&#8221;&amp;gt;View the story &#8220;Keynote at IIW&#8221; on Storify&amp;lt;\/a&amp;gt;]<\/noscript><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This year\u00a0Phil Windley\u00a0asked me to give\u00a0&#8220;the opening\u00a0keynote&#8221; at the Internet Identity Workshop (IIW) conference in Mountain View CA.\u00a0\u00a0I was a little skeptical&#8230; If you haven&#8217;t attended,\u00a0the IIW is\u00a0the perfect &#8220;un-conference.\u00a0 It has no keynotes or panels, it&#8217;s about getting stuff done.&#8221;\u00a0\u00a0Besides that,\u00a0everyone doing anything leading edge\u00a0in digital identity\u00a0attends as often as they can &#8211; it&#8217;s &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=1631\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Keynote on Laws of Identity at IIW<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1631"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1631"}],"version-history":[{"count":7,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1631\/revisions"}],"predecessor-version":[{"id":1640,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1631\/revisions\/1640"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}