Dave Birch went to a SXSW talk by Sam Lessin, head of the identity product group at Facebook. Sam said that the social graph will replace the need for social "hacks" - badges that attest to a person's identity and attributes. Dave does a great job reporting and commenting:
Dave Birch: Sam Lessin: Social "hacks" are going to be replaced by computations across the social graph "At this year's South-by-Southwest Interactive (SXSW) in Austin, Texas, I went along to a session called "Identity + 30", which was run by Sam Lessin, Head of the Identity Product Group at Facebook. The idea of the discussion was, if I understood it properly, not to be "right" about what identity would actually be a generation from now, but to create a framework for discussing identity now. Sam is a pretty interesting guy, and he got me thinking right from the start of his session, which I mean as a serious compliment, because to be completely honest this was not true of all the sessions I went to." [TooTallSid is skeptical. I added my comment to the blog entry.]
There were a number of other items on interest to the identity community:
Tim Bray: On ID Tokens "These are a product of the OpenID Connect work, and I think they're going be super-useful; in fact I keep getting ideas for nifty things you could do with them. So here's a walk-through on what they are and how they work; maybe you'll have some ideas too."
Heidi Bleau: Digital Identities: I Have One For Sale "The term digital identity is so suiting to who we really are online. Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with others...most of our lives are digital. In a research study by Harris Polls (commissioned by RSA) on digital identities, the most popular online accounts for consumers are email, financial and banking, and entertainment/shopping. And on average, they access these online accounts from two different digital devices. But what does a digital identity really mean?"
Pete Pachal: Dropbox for Business Arrives, Bringing Single Sign-On ""SSO using SAML is clearly an enterprise feature," says Jaswa. "But our customers now range all the way from small businesses to divisions of large companies, and several large companies are talking to us about much larger deployments, and we wanted to come up a name that adequately reflected our customer base.""
Dave Kearns: Just the fact(or)s, ma'am "But two-factor authentication is really only one case within the more established paradigm of multi-factor authentication (MFA), where "multi" stands for "more than one" and might be two but could be three, four or more. And multi-factor authentication is hardly the new kid on the block - I've been writing about it since last century."
Breakthrough Efficiency: the power of volunteered information "Market analyst and advisory company Ctrl-Shift has published a Briefing Paper. The report explores how a new breed of Volunteered Personal Information (VPI) services, including miiCard, are empowering individuals and delivering real value to consumers and businesses."
Ashlee Vance: Nebula Builds a Cloud Computer for the Masses "The origins of Nebula One go back to Kemp's days at NASA, which he joined in 2006 as director of strategic business development. In 2007, he became a chief information officer, making him, at 29, the youngest senior executive in the U.S. government. In 2010, he became NASA's chief technology officer. Kemp spent much of his time at NASA developing more efficient data centers for the agency's various computing efforts. He and a team of engineers built the early parts of what is now known as OpenStack, software that makes it possible to control an entire data center as one computer."
John Fontana: Will Facebook have a home for privacy? "Facebook Home officially launches Friday and privacy is (not surprisingly) the nagging question." "I salute those who will pilot Facebook Home -- they are the canaries in a coal mine that has already produced noxious fumes. We'll check in with you when (and if) you leave the mine with your privacy intact."
Doc Searls: Why durable links matter "In The Web We Lost and How We Lost the Web, Anil Dash describes the slope down which we have collectively slid over the last decade or so, as more and more of our documents and activities online have become streams instead of pages, and locked up in what Bruce Schneier calls a feudal world of walled POPS: Privately Owned Public Spaces."
NSTIC Pilot Common Considerations: 1 - Terminology "In advance of the IDESG plenary, we're launching a series of blog posts that focus on some of the common questions that have emerged as the pilots have moved forward. Given that NSTIC relies on a multi-stakeholder collaborative process to advance the Identity Ecosystem, our hope is that these blogs on pilot "Common Considerations" will kick off discussion and collaboration on these questions. "
NSTIC on the Global Identity Stage "Since NSTIC's release nearly two years ago, one of the most frequent questions we get is: just how seriously should we take the "N" in NSTIC? Stakeholders both in the U.S. and abroad have asked whether the fact that NSTIC is a "National" strategy somehow implies that the U.S. is trying to create an Identity Ecosystem that stops at our borders."
FICAM Trust Framework Solutions TFPAP Update v1.1.0 "This is a point update that does not change any of the existing TFP processes but instead: - Acknowledges an existing internal Government process in order to recognize non-federally issued PKI providers, who are cross-certified with the Federal Bridge, as approved Credential Service Providers under the FICAM Trust Framework Solutions umbrella. - Incorporates the Trust Framework Solutions (TFS) "branding" under FICAM. "
"This is a calendar of events that I know in 2013 (and beyond). I think their interesting, I'm currently planning attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach."
Identity Woman: She's Geeky Seattle: April 26-27 "She's Geeky is a kind of magical event where women geeks of all kinds, gaming geeks, linux geeks, fandom geeks, crafting geeks, beekeeping geeks, drupal geeks, raspberry pi geeks, Arduino geeks, geeks in training, come together and hang out learning from each other."
Coming to the IDESG Plenary in Santa Clara May 9-10: Identity Ecosystem Use Case Workshop "The Identity Ecosystem Steering Group (IDESG) is shifting into high gear to develop the policies, standards, and accreditation processes for the Identity Ecosystem Framework. The upcoming May 9-10 Santa Clara, Calif., plenary will feature the Management Council discussing the IDESG's work plan for the months ahead, reports by the NSTIC pilot projects on their progress in catalyzing the marketplace in key sectors, and, very important, a workshop that will identify a consensus set of use cases - specific examples of the Identity Ecosystem in use in real world applications."
Identity Woman: Online Community Unconference "Its BACK!" "May 21st at the Computer History Museum I am really excited to be working with a super awesome crew of leaders of the Online Community Manager Tribe - or OCTribe. We have been considering reviving the event and the pieces have finally come together to do it."
Federating Communities, Nations and Markets in a Big-Data Economy: Lessons learned from Academia to Governments and Enterprise... "European Identity & Cloud Conference 2013 16.05.2013 10:30-11:30 Track: Trust Frameworks Combined Session Joni Brennan, Kantara Initiative, Dave Kearns, KuppingerCole, Aljosa Pasic, Atos Research & Innovation, Colin Wallis, New Zealand Government The great thing about NSTIC, EUSTIC and other cyber focused identity strategies is that they attract more people and communities to the discussion. The not so great thing is that discussions have to start over and take everyone through the history and journey. What early adopters know and have practiced for some time only becomes common knowledge when the last person understands the concepts. To be clear, this is not a workshop. This is where Kantara Initiative brings together experienced Federation practitioners from around the world to answer questions like: Why do some federations succeed while others fail? What does the business of federation look like? What is inter-federation and how far are we from it?"
SAML, OAuth, SCIM, XACML "European Identity & Cloud Conference 2013 15.05.2013 14:00-15:00 Track: How to Build your IAM/IAG Infrastructure the Right Way - and Support Business Today Combined Session OASIS Panel: ID Protocols - Out with the Old and in with the New? Craig Burton, KuppingerCole, Peter Cummings, KuppingerCole, David Brossard, Axiomatics AB, Dr. Michael B. Jones, Microsoft, Dr. Paul Madsen, Ping Identity, Darran Rolls, SailPoint Each speaker will cover the pros and cons of one protocol and take questions from the audience. "
Call For Papers - Open Identity Summit 2013 "September 10th - 11th 2013, Kloster Banz, Germany Deadline for electronic submissions: May 15th, 2013 The aim of Open Identity Summit 2013 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing."
eID & ePass 5th edition "National eID & ePassport Conference - the Global Forum on the drivers behind the digitalization of citizen ID documents proudly announce the 5th edition in BERLIN 2013, 28th & 29th of October @Intercontinental Berlin."