article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. In one step Facebook can become an enterprise application, including proprietary discussions.

Trends 60
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Those are the two easy to understand checks.

Windows 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

The concept of an identity metasystem was first introduced by Kim Cameron in 2005 (PDF). For example, I may have a credential representing my drivers license and one representing my employee ID. When I say "digital identity system" most people probably think of just one thing: authentication. Drivers license. Titles (e.g.

System 87
article thumbnail

SeanDaniel.com [tech]: How to use your Home Server as an AirPrint.

Sean Daniel

Of course I can play around with this for 7 days on trial, then I’ll have to get a license key for FingerPrint. Hi Dave, My guess is you've somehow managed to add some authentication to who can print. ► 2005. At this point, the printing just started! Additional Bonus! 9/10/2012 6:30 PM. Sean Daniel.

How To 64
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

When you hand your driver’s license to the bartender to establish your legal age, we would be surprised if she could remember all the detailed information it contains, like your address, and do that for every patron she encountered. Privacy — No one will be surprised to learn that computers are very good at pattern matching.

Internet 102
article thumbnail

The future of adult entertainment - Trends in the Living Networks

Trends in the Living Networks

Virtually sleeping with celebrities or fighting dragons and seducing damsels in distress will be one option; at the other end of the escapist spectrum, "authentic" experiences with ordinary people will be popular for similar reasons. Some of this will be pure fantasy. Almost every form of entertainment is becoming participatory.

Trends 108
article thumbnail

Sen. Ed Markey on the politics of technology

The Verge

He has been a proponent of net neutrality, first proposing a bill in 2005. MK: As all good memes should be, it’s authentic, right? 1993, I was able to move over 200 megahertz of spectrum for the third, fourth, fifth, sixth, and seventh cellphone license. I never had the vertical or the horizontal game to go with it.

.Net 91