BT
rss
  • DevOps Follow 646 Followers

    GDPR for Operations

    by Jon Topper Follow 0 Followers on  Mar 10, 2018 1

    With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem.

  • Followers

    Author Q&A on Leading without Authority

    by Savita Pahuja Follow 2 Followers on  Aug 16, 2015 2

    Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. He refers to this as an "Individual Leader". This post explains how to lead without authority.

  • Followers

    Hologram - Finally, AWS Key Distribution that Makes Sense

    by Arian Adair Follow 0 Followers on  Mar 31, 2015

    Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram, a system that brings Amazon's Instance Profile mechanism to developer workstations. Adair details the process, tool design and main features.

Followers

Do we really need identity propagation in SOA and Clouds?

Posted by Michael Poulin Follow 0 Followers on  Aug 20, 2012

While a majority of security specialists are managing identity through SSO nobody has answered the question if identity propagation in SOA and Clouds is feasible from a business perspective. 6

Followers

Don't SCIM over your Data Model

Posted by Ganesh Prasad Follow 0 Followers on  Aug 08, 2012

This opinion piece discusses limitations in the SCIM data model specification as perceived by the author. He provides three specific suggestions which were also posted to the SCIM mailing list. 5

Followers

The Future of Authentication

Posted by Dirk Balfanz Follow 0 Followers , Richard Chow Follow 0 Followers , Ori Eisen Follow 0 Followers , Markus Jakobsson Follow 0 Followers , Steve Kirsch Follow 0 Followers , Scott Matsumoto Follow 0 Followers , Jesus Molina Follow 0 Followers , Paul van Oorschot Follow 0 Followers on  May 04, 2012

In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1

Followers

Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden Follow 0 Followers on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT