{"id":82,"date":"2005-08-09T02:01:43","date_gmt":"2005-08-09T02:01:43","guid":{"rendered":"\/?p=82"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"get-smart-on-the-new-identity-thinking-in-less-than-a-week","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=82","title":{"rendered":"Get smart on the new identity thinking in less than a week"},"content":{"rendered":"<p>Analyst <a href=\"http:\/\/www.redmonk.com\/jgovernor\/\">James Governor<\/a> of <a href=\"http:\/\/www.redmonk.com\/\">Redmonk<\/a> has done a piece about how to &#8220;<a href=\"http:\/\/www.redmonk.com\/jgovernor\/archives\/000869.html\" class=\"broken_link\">Get smart<\/a> on the new identity thinking in less than a week&#8221;.  Isn&#39;t this is a great heading? <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;I was talking yesterday to <a href=\"http:\/\/www.securewave.com\/nwr_pressReleasesDetails.jsp?id=5695\" class=\"broken_link\"><font color=#003366>Dennis Szerszen, vp of marketing at Securewave<\/font><\/a>, a company that keeps Microsoft shops ticking over calmly by enabling whitelist policies of acceptable executables (the zen of behaviour blocking).&#8221;<\/p>\n<\/blockquote>\n<p dir=ltr>I&#39;m going to come back to this in another piece &#8211; it is a perfect example of how a &#8220;whitelist&#8221; reputation architecture is stronger than a &#8220;blacklist&#8221; architecture.  <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Anyway, we were discussing the notion that identity is only important <em>in context<\/em>. We both agreed the notion of a single canonical digital identity for everything is absurd.&#8221;<\/p>\n<\/blockquote>\n<p dir=ltr>He then goes on to describe<em><strong> <\/strong>Information Bulimia<\/em> (I think that&#39;s a first):<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;To my mind this is why the approach of the mooted <a href=\"http:\/\/en.wikipedia.org\/wiki\/British_national_identity_card\"><font color=#003366>British National ID Card System<\/font><\/a> looks like an expensive and potentially dangerous failure (in terms of budget, civil liberties and fraud opportunities); its a Big Bang, the kind of program the UK Government and associated public sector service provider cartel have a terrible track record for delivering. Most problematical however is the attempt to create a digital ID useful in seemingly every conceivable public meets private sector digital context. It will prevent welfare benefit fraud, catch terrorists, be used by commercial organizations (Insurance companies, potentially), and probably solve world poverty too.<\/p>\n<p>&#8220;Unfortunately in real life the massive central ID database will probably suffer from <strong>information bulimia<\/strong>, a disorder common amongst information intermediaries, characterized by episodic binge data collection followed by uncontrollable vomiting and purging, leading to information leakage and theft.&#8221;<\/p>\n<\/blockquote>\n<p dir=ltr>It does seem to be a tendency, doesn&#39;t it?<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;But anyway back to Dennis and the conversatron. We were discussing USB memory sticks and other portable mass storage devices, a huge information breach challenge for all kinds of company. You don&#39;t necessarily want to block <em>all<\/em> USB access, it depends on the <em>context<\/em>. That is where his firm is focusing attention.<\/p>\n<p>&#8220;I wanted to provide more context for our discussion and suggested Dennis read some blogs on &#8220;the new identity thinking&#8221;. I don&#39;t mean oldline discussions concerning SSO and PKI, but rather people working on new (often lightweight) approaches and thinking to identity problems. These are the thinkers that will enable new business models, and hopefully some more coherent national policies on identity and privacy going forward. We should all engage with this kind of thinking because ID is important and it is tightly associated with our civil liberties.<\/p>\n<p>&#8220;Anyway &#8211; I reckon that if you subscribe to and read the blogs below for just a few days your ID IQ will be significantly increased. i tried to limit it to ten or so, and gave myself some breathing room for feedback. Should I have included Sun&#39;s very own <a href=\"http:\/\/blogs.sun.com\/roller\/page\/superpat\/Weblog?catname=%2FFederation\" class=\"broken_link\"><font color=#003366>Superpat<\/font><\/a>, for example? Who is driving the new thinking at IBM- is there a <a href=\"http:\/\/www.intertwingly.net\/wiki\/pie\/SamRuby\"><font color=#003366>Sam Ruby<\/font><\/a> of ID out there? I basically erred on the side of Web 2.0 folks. Change agents, that is. <\/p>\n<p>&#8220;So here you go &#8211; Now go get smartened up.<\/p>\n<p>&#8220;<a href=\"https:\/\/www.identityblog.com\/\"><font color=#003366>Kim Cameron<\/font><\/a>, Microsoft<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Perhaps the most influential figure in Identity 2.0. Why? Because Kim is driving Microsoft&#39;s Identity Management strategy, and he wants to put the user, rather than the corporation, at the center of the world. The real deal is our Kim. Put forward <a href=\"\/?p=352\"><font color=#003366>seven laws of identity<\/font><\/a> to help drive the debate forward. &#8220;<\/p>\n<\/blockquote>\n<\/blockquote>\n<p dir=ltr>James makes it sound like I had the good sense to come up with the idea that the user <strong>should<\/strong> be at the center, when in truth I&#39;m just acting on the fact that the user<strong> is obviously<\/strong> at the center &#8211; <em>if you want your system to succeed<\/em>.  It&#39;s a simple matter of boarding the <a href=\"http:\/\/technorati.com\/tag\/cluetrain\" class=\"broken_link\">cluetrain<\/a>, as <a href=\"http:\/\/doc.weblogs.com\/\" class=\"broken_link\">Doc<\/a> would say.  I mean, it&#39;s coming straight at us&#8230;  But I&#39;ll still take any compliment I can get &#8211; just to keep the energy up&#8230;<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;<a href=\"http:\/\/www.burtongroupblogs.com\/jamielewis\/\" class=\"broken_link\"><font color=#003366>Jamie Lewis<\/font><\/a>, Burton Group<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Whatever you think of industry analyts it is hard to argue Burton Group have been instrumental in driving the state of the art forward on directory and identity.<\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/ericnorlin.typepad.com\/weblog\/\" class=\"broken_link\"><font color=#003366>Eric Norlin<\/font><\/a>, <a href=\"http:\/\/blog.pingidentity.com\/blog\/default\/\" class=\"broken_link\"><font color=#003366>Ping Identity<\/font><\/a> <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Eric is quite simply an identity <a href=\"http:\/\/news.com.com\/The+red+herring+of+data+protection\/2010-1029_3-5756250.html\" class=\"broken_link\"><font color=#003366>news maker<\/font><\/a>. Is that the same as a noise-maker? \ud83d\ude42 No-he gets things done.<\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/www.kaliyasblogs.net\/Iwoman\/\" class=\"broken_link\"><font color=#003366>Kaliya Hamlin<\/font><\/a>, Identity Woman <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Kaliya has all necessary technical gubbins, the respect of her peers, and umm. she&#39;s a she. Its important more women are part of the identity conversation because they likely see things differently than male alpha geeks. As we&#39;re seeing over at the <a href=\"http:\/\/www.blogher.org\/\" class=\"broken_link\"><font color=#003366>Blogher<\/font><\/a> conference, questions of identity and credibility are closely associated (<a href=\"http:\/\/blog.qumana.com\/blog\/_archives\/2005\/7\/30\/1091647.html\" class=\"broken_link\"><font color=#003366>the link debate<\/font><\/a>). What is the A-list? Its surely an identity management system&#8230;  And if women do share more personal information online, as <a href=\"http:\/\/www.blogaholics.ca\/\" class=\"broken_link\"><font color=#003366>Blogaholics notes<\/font><\/a>, what does that say for identity and metadata management in a digital age, and <a href=\"http:\/\/www.redmonk.com\/sogrady\/archives\/000382.html\" class=\"broken_link\"><font color=#003366>potential abuse of same<\/font><\/a>?<\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/www.windley.com\/archives\/2005\/08\/announcing_the_1.shtml\"><font color=#003366>Phil Windley<\/font><\/a>, Technometria <\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Smart dude from Brigham Young, part of the new identity community cluster.<\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/www.freeid.org\/2005\/08\/02.html#a642\"><font color=#003366>Scott C. Lemon<\/font><\/a>, Digital Identity Management<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Digital Identity-its what Scott does. This blog is a great place to start thinking about the issues.<\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/www.anonequity.org\/en3\/index-people.html\" class=\"broken_link\"><font color=#003366>On The Identity Trail<\/font><\/a>, Province of Ontario ID mavens<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;Ontario is an e-government hub. Canada hopefully shows us that privacy should be considered when governments drive ID initiatives. <\/p>\n<\/blockquote>\n<p>&#8220;<a href=\"http:\/\/identity20.com\/\"><font color=#003366>Dick Hardt<\/font><\/a>, Identity 2.0<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p>&#8220;I couldn&#39;t exactly use Identity 2.0 in my title without pointing to the guy credited with coming up with the term. I subsequently changed the blog title, but he is certainly an influencer of merit.<\/p>\n<\/blockquote>\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">&#8220;There are some organizations with something useful to say: <a href=\"http:\/\/www.projectliberty.org\/\"><font color=#003366>Liberty Alliance<\/font><\/a>, <a href=\"http:\/\/sxip.com\/\" class=\"broken_link\"><font color=#003366>Sxip Networks<\/font><\/a>, <a href=\"http:\/\/www.identitycommons.net\/\"><font color=#003366>Identity Commons<\/font><\/a>, <a href=\"http:\/\/lid.netmesh.org\/\"><font color=#003366>LID NetMesh<\/font><\/a>, <a href=\"http:\/\/www.passel.org\/trac.cgi\"><font color=#003366>Passel.org<\/font><\/a>. Here is an <a href=\"http:\/\/devresource.hp.com\/drc\/resources\/fed_land\/index.jsp\" class=\"broken_link\"><font color=#003366>HP primer<\/font><\/a> on Federated ID-related protocols.<\/p>\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">&#8220;So there you go Dennis &#8211; some advanced thinking on identity in context. &#8220;<\/p>\n<\/blockquote>\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">James ends with a golden maxim that eminates directly from the soul of technological inevitability:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">A final word from monkchips: <em>digital living will increase the number of identities we use as it increases the number of contexts and communities in which we interact<\/em>. <\/p>\n<\/blockquote>\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">This is good.  And is why I have slaved so hard to get InfoCards into place.<\/p>\n<p dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<blockquote><\/blockquote>\n<p><font color=darkblue size=2><\/p>\n<p align=right>[tags: <a href=\"http:\/\/technorati.com\/tags\/digitalidentity\" rel=\"tag\" class=\"broken_link\">Digital Identity<\/a>, <a href=\"http:\/\/technorati.com\/tags\/identity\" rel=\"tag\" class=\"broken_link\">Identity<\/a>, <a href=\"http:\/\/technorati.com\/tags\/jamesgovernor\" rel=\"tag\" class=\"broken_link\">James Governor<\/a>, <a href=\"http:\/\/technorati.com\/tags\/cluetrain\" rel=\"tag\" class=\"broken_link\">Cluetrain<\/a>, <a href=\"http:\/\/technorati.com\/tags\/informationbulimia\" rel=\"tag\" class=\"broken_link\">Information Bulimia<\/a>] <a href=\"http:\/\/technorati.com\/tags\/kimcameron\" rel=\"tag\" class=\"broken_link\"><\/a><\/p>\n<p><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analyst James Governor of Redmonk has done a piece about how to &#8220;Get smart on the new identity thinking in less than a week&#8221;. Isn&#39;t this is a great heading? &#8220;I was talking yesterday to Dennis Szerszen, vp of marketing at Securewave, a company that keeps Microsoft shops ticking over calmly by enabling whitelist policies &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=82\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Get smart on the new identity thinking in less than a week<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/82"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=82"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/82\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}