article thumbnail

Women IT leaders take center stage

CIO Business Intelligence

Karen Stine, head of data, Willis Towers Watson Willis Towers Watson So Stine focused on raising her profile in the data profession by writing white papers, posting thoughts online, working with professional organizations, seeking speaking engagements, and seizing high-profile opportunities at work. “It

IBM 130
article thumbnail

Some Photoshop users can try Adobe’s anti-misinformation system later this year

The Verge

Adobe has released more details on its Content Authenticity Initiative, a system for permanently attaching sources and details to an image. A newly released white paper makes its scope clearer. The white paper makes clear that Adobe will need lots of hardware and software support for the system to work effectively.

Adobe 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity and Consistent User Experience

Phil Windley

The web, and the internet for that matter, never had a consistent user experience for authentication. They don't see keys, passwords, authentication codes, and other artifacts of the ad hoc identity systems in widespread use today. Photo Credit: Red leather wallet on white paper from Pikrepo (CC0). That's unfortunate.

article thumbnail

Operationalizing Digital Relationships

Phil Windley

The result is better, more authentic, digital relationships, more flexible online interactions, and the preservation of human freedom, privacy, and dignity. In Authentic Digital Relationships , I discuss how the architecture of an identity system affects the authenticity of the relationships it manages.

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. In one step Facebook can become an enterprise application, including proprietary discussions.

Trends 60
article thumbnail

Token-Based Identity

Phil Windley

Peter references a white paper on central bank digital currencies and one on identity composability by Andrew Hong to lead into a discussion of account- and token-based identity. Traditionally, we've done that with accounts and identifying, using authentication factors, who is connecting.

Insurance 137
article thumbnail

Liveblog: VMworld 2017 Day 1 Keynote

Scott Lowe

Multi-factor authentication. These simple principles are being discussed in more details in a white paper being released by VMware today. Talking about cyber-hgyiene, Gelsinger says there are 5 pillars to cyber-hygiene: Least privilege. Microsegmentation. Encryption.

Vmware 60