Orange, a mobile network operator and Internet service provider in the United Kingdom, is looking to create cutting edge apps and has tapped Apigee to help open Orange APIs and attract the best developer talent, according to a story by Margi Murphy of ComputerWorld UK. "The new API platform will be instrumental in the carrier's upcoming projects which will launch this year, including a personal customer cloud and automated customer identities so users will not have to repeatedly log into applications on their devices," according to Murphy. Orange has a portfolio of 7,493 patents and 5,000 employees focused on business innovation. It employs 1,000 in-house developers.
Read on for more colorful stories
Ryan Mac: EBay CEO: Sales, Earnings Affected By Cyberattack Body Blow In Challenging Second Quarter Nearly two months after disclosing a cyberattack that may have affected 145 million users, CEO John Donahoe did little to sugarcoat the damages to his company's operations and performance. On Wednesday during eBay's second-quarter earnings call, he admitted that the company-wide password reset-a safety measure as a result of the hack-affected the company's commerce volume and put the firm's marketplace business in a hole. Donahoe said that 85% of buyer accounts have already reset their passwords.
Darrell Etherington: Apple Patents A Way For Your iPhone To Lock Out Users Whose Behavior It Doesn't Recognize Apple has a new patent out that describes a method for locking a device or asking a user for proof of their identity if the device detects a pattern of unusual behavior. It's a security method that goes beyond the standard pins and passwords, letting your phone pick up on cues like your specific grammar habits, vocabulary, motion sensor information and particular gesture entry style to build a profile of who you are as a mobile device user.
David Gorton, Matt Klassen: Beyond the Firewall: A Six-Part Series The Ping Identity duo are examining six trends sweeping across the IT landscape that are taxing traditional identity architectures and carrying enough power to make or break enterprise business strategy. This introduction outlines each trend and sets up a deeper discussion that will take place over the coming weeks.
Robert Westervelt: RSA Acquires Symplified Technology Assets In Fire Sale SaaS-based identity and access management provider Symplified is shuttering its operations after selling off its technology assets to RSA in an apparent fire sale deal that closed in June. RSA, The Security Division of EMC Corp., will be integrating the Symplified technology into its identity portfolio and "it will not have an immediate operational capability."
Dan Goodin: Crypto weakness in smart LED lightbulbs exposes Wi-Fi passwords More evidence the Internet of things treats security as an afterthought. In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices.
Paul Roberts:Yet Another IoT Standards Group: This One For Privacy Data privacy firm TRUSTe announced that it is forming a group to identify technical standards to ensure consumer privacy in the Internet of Things. Speaking at the Internet of Things Privacy Summit in San Francisco last week, Chris Babel, the CEO of TRUSTe said that the multi-party group will draw up "technical standards to help companies develop the privacy solutions that are needed to protect consumer privacy in the Internet of Things." The group, dubbed the IoT Privacy Tech Working Group will include representatives from TRUSTe as well as online privacy groups The Center for Democracy & Technology, The Future of Privacy Forum and the Online Trust Alliance.
Jason Bloomberg: Seven reasons why the Internet of Things is doomed The IoT explosion is rather curious if you think about it, as the Internet has been with us now for nigh on two decades, and everything connected to it has always been some kind of thing. But now it seems every kind of thing from dishwashers to doorknobs require an Internet connection, since after all, we all know our dishwashers have long harbored a pent up desire for scintillating conversation with our doorknobs.
Morteza Ansari: SCIM Overview (Slideshare) A principal engineer at Cisco, Ansari uses this slide presentation to break down the System for Cross-Domain Identity Management, including history, use cases, schema, examples, protocols, operations, security, references.
Kashmir Hill: Facebook's Chief Critic Wants Government To Investigate Websites Turning Users Into Guinea Pigs James Grimmelmann, a law professor at the University of Maryland who specializes in the law of the Internet, and fellow law professor and bioethicist, Leslie Meltzer Henry, fired off a round of letters Thursday asking the academic journal that published the Facebook emotions study to retract it, asking the Office for Human Research Protections to investigate why Cornell University's ethics board raised no objections, and asking the Federal Trade Commission to investigate not just Facebook's numerous experiments on users, but the "ethical research practices [of other] Internet companies."
David Barrett: 'Right to be forgotten' will create 'tsunami' of privacy appeals A European ruling which has led to calls for a "right to be forgotten" on the internet will lead to a "tsunami" of new applications to the data protection watchdog, the U.K. Information Commissioner has said. Christopher Graham, who leads the organization which deals with data privacy issues, predicted a surge in his workload following the highly controversial judgment in the European Court of Justice last month.
APIs / Developers
Rhys Fisher: 12 Killer Resources for API Practitioners A hammer, chisel, file, rasp -- all humble tools. In the hand of a master like Antoni Gaudí though, they are the instruments used to create a world wonder. Just like these crafting instruments, the API is the tool providing developers with the opportunity to reshape our digital world.
Matt Asay: We're living in a post open source world After years of bitter feuds between free software and open source advocates, open source won. But it was a temporary victory. While proponents of Apache-style licensing had a brief period to gloat, the GitHub generation actually seems determined to take open source to its logical conclusion: Releasing most software under no license at all. Are developers simply too careless to bother with a license, or is there something bigger underway?
Cloud Identity Summit 2014 July 19-22; Monterey, Calif. The modern identity revolution is upon us. CIS converges the brightest minds across the identity and security industry on redefining identity management in an era of cloud, virtualization and mobile devices.
Gartner Catalyst - USA Aug. 11-14; San Diego, CA A focus on mobile, cloud, and big data with separate tracks on identity-specific IT content as it relates to the three core conference themes.
Application Security Forum Nov. 4-6; Yverdon-les-Bains, Switzerland The conference is a well-established annual event dedicated to information, application and software security that features a full-day of training sessions and two days of conference sessions.