article thumbnail

In Memory of Kim Cameron

Phil Windley

We held the first IIW in October 2005. Whether you view the laws as leading to the metasystem design or springing from it, they are both necessary to a future where people can live rich, authentic online lives. I had met Kim and talked to him at several identity conferences back in the early 2000's.

Microsoft 133
article thumbnail

Identity and Consistent User Experience

Phil Windley

The web, and the internet for that matter, never had a consistent user experience for authentication. Kim Cameron gave us a model back in 2005 when he introduced Information Cards. They don't see keys, passwords, authentication codes, and other artifacts of the ad hoc identity systems in widespread use today. That's unfortunate.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You can now buy a $475 NFT ticket to see Beeple’s $69 million NFT at an IRL party

The Verge

That means the image’s owner, Metapurse, the crypto fund run by the pseudonymous investor Metakovan , is taking its one-and-only authentic copy of the image (or at the very least, its nominally exclusive display rights) and using them to put this piece of artwork up for a night as though it were being temporarily shown in a gallery.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

He originally joined the travel company’s board in 2005. AskJeeves was acquired in 2005 by IAC, the internet media company run by Barry Diller, who is also chairman of Seattle-based Expedia Group. . — George “Skip” Battle , the former CEO of AskJeeves, has resigned from Expedia Group’s board of directors.

Groups 81
article thumbnail

The Self-Sovereign Internet

Phil Windley

Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier. Secure - DID-based relationships are mutually authenticating. To do so, they use identifiers , convenient handles that name the thing being remembered.

article thumbnail

Ex-Bungie developers revive ‘Six Days in Fallujah,’ cancelled game about Iraq War’s bloodiest battle

GeekWire

Six Days combines personal interviews, video footage, photographs, and gameplay, striving to be “the most authentic military shooter to date,” with the developers working alongside both military and civilian survivors of the conflict. A letter to our community. SixDaysGame pic.twitter.com/WfEoebcp7x.

article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Additionally, Symantec is a founding member of the Open Cybersecurity Schema Framework and the National Cybersecurity Centre of Excellence, which both are working to develop standards for Zero Trust, a security framework that authenticates and validates user identity and access. He has held this position since March 2006.

Vmware 72