Grant Hatchimonji: Why facial recognition isn't the way of the future...yet It's the how the future is meant to be, isn't it? The good guys need to find a bad guy in a crowd of people, so they start scanning the environment with a camera that is equipped with facial recognition technology. Seconds later, they scan a face that's a positive match with an entry in their criminal database and bam, they've smoked him out. That future, however, is already here. Sort of.
Lisa Vaas: Researchers find post-Snowden chill stifling our search terms Researchers from MIT and Digital 4th - a coalition "dedicated to bringing Fourth Amendment protections into the 21st century" - used Google Trends to study the use of sensitive search terms before and after 6 June 2013, when Edward Snowden first began to expose the extent of NSA surveillance.
Authentication and Authorization for Constrained Environments charter-ietf-ace-00-00 The IETF has recently developed protocols for use in constrained environments, where network nodes are limited in CPU, memory and power. It has been observed that Internet protocols can be applied to these constrained environments, often only requiring minor tweaking and profiling. In other cases, new protocols have been defined to address the specific requirements of constrained environments. An example of such a protocol is the Constrained Application Protocol (CoAP).
Kaliya Hamlin: Field Guide to Internet Trust Models: Introduction The decreasing cost of computation and communication has made it easier than ever before to be a service provider, and has also made those services available to a broader range of consumers. New services are being created faster than anyone can manage or even track, and new devices are being connected at a blistering rate. In order to manage the complexity, we need to be able to delegate the decisions to trustable systems.
Allen Storey: How can we trust the internet of things? As we move closer to an always-connected world, we must remember that anything connected to the Internet is vulnerable to attack. The problem may be complex, but the solutions are simple. We just need to agree as an industry.
Jeffrey Burt: Internet of Things Present Host of Security Challenges Many people who are looking at the Internet of things (IoT) are in the same way awed by the promises of efficiencies, business capabilities and data capture that having billions more connected devices will bring, and there doesn't seem to be the necessary urgency about the security threat scenarios that can arise when so many systems are connected via the Web, said Emil said Sturniolo, managing partner with the InStep Group, a product development consulting firm. If those concerns aren't addressed early enough in the evolution of the IoT, it may be difficult to catch up later in the game, he said.
Ilya Grigorik: Minimum Viable Block Chain Cryptocurrencies, and Bitcoin in particular, have been getting a lot of attention from just about every angle: regulation, governance, taxation, technology, product innovation, and the list goes on. The very concept of a "peer-to-peer (decentralized) electronic cash system" turns many of our previously held assumptions about money and finance on their head.
Ryan Faas: The future of mobile navigation Several companies have created Wi-Fi-based location systems that can function indoors, often referred to as indoor positioning services or indoor GPS, and both Apple and Google have snapped up players in this sector. Google's Project Tango, announced earlier this year, is another technology that can be used in mapping spaces, particularly indoor spaces, where traditional location services falter. Although all of these next-generation location services are designed as solutions to a common problem, they take quite different approaches.
Glue Conference 2014 May 21-22; Broomfield, Colo. Cloud, DevOps, Mobile, APIs, Big Data -- all of the converging, important trends in technology today share one thing in common: developers.
European Identity & Cloud Conference 2014 May 13-16, 2014; Munich, Germany The place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Gartner Catalyst - UK June 17-18; London A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14; San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Application Security Forum Nov. 4-6; Yverdon-les-Bains, Switzerland The conference is a well-established annual event dedicated to information, application and software security that features a full-day of training sessions and two days of conference sessions.