Linux for Suits - Independent Identity

Can a free market in identity systems emerge from a confusing array of vendor-specific silos? Doc sees hope from an unlikely source.
______________________

Doc Searls is Senior Editor of Linux Journal

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Diflucan online

Kiernan's picture

How are you. Of all noises, I think music is the least disagreeable.
I am from India and also am speaking English, please tell me right I wrote the following sentence: "Information on polish airports and domestic and international flights."

Thanks for the help ;), Kiernan.

BS detector

Anonymous's picture

I read Doc's article and -sorry- my BS detector went off.
I reset it, read some more and it went off again.
Kim's "genius" seems to amount to meta-izing things and this
"laws" are not too inspired. How's about making a system that
does something simple and practical?! Like: can I buy stuff online
without the usual credit card number woes?, Can I login to a guest account on by friends box without tons of setup, Can I even post
to a blog without reentering info. Show me something useful then you
can write all the papers you want. Look at Tim Berners Lee - invent then philosophize.

Inventions and Growing Pains

matt's picture

The interesting things about inventing before philosophizing are that (a) defining a standard by way of invention-only leads to competing conventions, since everyone is inventing at the same time, and (b) worse, the structures thus invented without philosophy are invented to satisfy a need - ONE need or ONE SET of needs: the minute a hack, workaround, or fix is implemented to extend the system to some new need, the system begins its slow and steady growth unto a convoluted, messy and difficult-to-maintain architecture. Invention without philosophy is not much different than building a house on sand - the minute the earth shakes, it starts to sink...slowly but surely. Without a solid foundation, the structure will fail. Sure, it's necessary to invent a little to try things out, prototype and think in code a little, but to go forth and do without thought, build without design or foundation, is downright dangerous.

Cheap authenticator on the cell phone?

Anonymous's picture

Cell phone carriers, why not take advantage of your ubiquitous hardware and unique SIMs to offer an intermediated web authentication service? An individual web site operator wouldn't be able to know *who* is logging on, or capture their real phone number, just that they are a real person, and they're the same person they were last time.

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix