article thumbnail

The Self-Sovereign Internet

Phil Windley

Summary: I'm attend the Hyperledger Global Forum this last week–all virtual. Alice) who, by virtue of knowing the authentication factors (e.g. Alice uses her private key to sign statements that authenticate herself and authorize use of the identifier. Secure - DID-based relationships are mutually authenticating.

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. In one step Facebook can become an enterprise application, including proprietary discussions.

Trends 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

“We automate five sets of critical processes and extend authentication and other network services into the cloud, making the cloud a seamless extension of the data center. December 2005 (10). November 2005 (8). October 2005 (9). September 2005 (15). August 2005 (2). July 2005 (9). June 2005 (7).

Tools 205
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Virtualization. ► 2005. Awesomeness.

Windows 45
article thumbnail

Seven Trends and Predictions for 2017

CTOvision

Prediction: Don’t expect machines to become sentient, but expect Microsoft and Google virtual assistants to actually become helpful. Nowhere in NIST’s definition is there a requirement for a hyper-visor or virtual machines. Why then do Amazon, Microsoft and OpenStack all rely on virtual machines? Trend #4—Bare Metal Cloud.

Trends 150
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates for client to.

Sean Daniel

In this post I talked primarily about how the server is authenticated to the client by using a “root” certificate that the client already trusts, thus establishing a trust relationship with a website you are at without actually having been there before. Virtualization. ► 2005. SBS 2011 Premium Add-on.

Windows 45
article thumbnail

SeanDaniel.com [tech]: How to set the Default Printer for All Users in.

Sean Daniel

As a test, I like to make sure it works for one user first, so let’s find a guinea pig and go from there: With the new Default Printer Policy selected, remove Authenticated Users from the Security filtering and place in the guinea pig user. Select Authenticated Users , and click Remove. Virtualization. ► 2005.

How To 51