Remove Airlines Remove Applications Remove Authentication Remove Licensing
article thumbnail

Zero Trust with Zero Data

Phil Windley

If we assume breach, then the only strategy that can protect the corporate network, infrastructure, applications, and people is to authorize every access. far fewer federations) and enable applications that have far greater scale. driver's license) to prove your age when buying beer, we ran convenience stores like a web app.

Data 66
article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

The hope is that these new analog chips will use dramatically less power making them useful for any of the mobile and distributed applications on machines that aren’t always plugged in. Chance of succeeding: The success or failure will probably be governed by the nature of the applications.

Tools 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

In describing this system, Kim said: We need a unifying identity metasystem that can protect applications from the internal complexities of specific implementations and allow digital identity to become loosely coupled. For example, I may have a credential representing my drivers license and one representing my employee ID. Titles (e.g.

System 87
article thumbnail

Generative Identity

Phil Windley

She might also use it at partner websites (like the benefits provider) to provide shared authentication without federation (and it's associated infrastructure). Traditional identity systems have been anemic , supporting simple relationships focused on authentication and a few basic attributes their administrators need. Drivers license.