Is Fin's Bluetooth ring the future controller in the Internet of Things world? You be the judge. The company says, "Fin is a trendy gadget you can wear on the thumb and make your whole palm a digital touch interface." Can this device go from trendy to mainstream and become the centerpiece for running all connected "things?" The company more than doubled its Indiegogo goal, raising more than $200,000. Will initial interest give rise to great success or sore thumbs.
Pat Patterson: SAML 2.0: The Universal ID Solvent The big Internet service providers are gathering around a specification called OpenID Connect, but in the enterprise world, the Security Assertion Markup Language version 2.0, or for short, rules the roost. The past and present belong to SAML, but most identity pundits point to OpenID Connect as the future, a lighter-weight JSON-based protocol that implements the most common single sign-on use cases.
Michelle Starr: Pingrid: password security based on pattern recognition Pingrid is based on a pattern. Instead of simply logging in the user is presented with a six-by-six grid split into four smaller three-by-three grids, each of which is filled with the numerals one to nine. The grid is randomly regenerated every minute, so it will rarely appear the same twice. The sequence of numbers required to log in is instead determined by a pattern on the grid pre-set by the user.
Owen Thomas: How APIs Connect the World Where once we thought of computing as an operation performed by chips in boxes, it now takes place at a higher level: Services connected by APIs, or application programming interfaces, power the Internet.
Steve Herrod: The rise of mobile-first infrastructure The mobile-first world requires some significant changes to the back-end infrastructure needed to deliver, support and manage it, and those changes will permeate the private data centers and public clouds of the future.
Interop March 31-April 4; Las Vegas Independent technology conference and expo series designed to inspire and inform the world's IT community.
Cloud Security Alliance, SecureCloud 2014 April 1-2; Amsterdam An opportunity for government experts, industry experts and corporate decision makers to discuss and exchange ideas about how to shape the future of cloud computing security. Focus is on legal issues, cryptography, incident reporting, critical information infrastructures and certification and compliance.
Philadelphia Secure World April 8-9; Valley Forge, Pa. One of North America's most vital cyber-security conferences, providing globally relevant education, training and networking for cyber-security professionals on a regional level.
ID360: The Global Forum on Identity April 9-10; Austin, Texas The ID360 theme is "Identity: Cradle to Grave," exploring how identity changes as a function of age for people, businesses and devices.
IIW May 6-8; Mountain View, Calif. The Internet Identity Workshop, better known as IIW, is an un-conference that happens at the Computer History Museum in the heart of Silicon Valley.
European Identity & Cloud Conference 2014 May 13-16; Munich, Germany The place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.