The famous talk is now on Web for those of us who missed it:
Ian Glazer: Killing IAM in Order to Save It "I gave this talk a few months ago. I had just finished writing our 2013 Identity and Privacy Planning Guide and was trying to think of a different way to express what I had written. What I came up with was this very, very different way to express what I had written. I'd love your feedback. Also, no commas were harmed in the filming of this presentation."
There were many other items of interest to the identity community:
IdentityWoman: European Identity Workshop in Feb. "The European Identity Workshop. February 12-13 in Vienna. Registration is here. Internet identity, identity federation and personal data online are complex, continually evolving areas. The event is inspired by similar events such as the Internet Identity Workshop in California, Identity North in Canada, and Identity Next in the Netherlands, with a focus on European perspectives and initiatives. At EIW, participants will seek deeper understanding, and better solutions to challenges like:" "Kantara Initiative supports the European Trust and Identity Workshop event as part of ongoing activities to build shared infrastructure, value, and experience to Identity and Access Management systems. We encourage Kantara members and participants to attend the European Trust and Identity Workshop."
2013 Election Schedule for the Identity Ecosystem Steering Group (IDESG) "February 14: To be eligible to vote in the officer elections your signed membership agreement must be received by the Secretariat before 11:59:59 PM (PT) on February 14, 2013. If you are an existing member, a membership agreement was already mailed to you in December 2012 for your signature. If you are not yet a member and would like to join as a member, please fill out a membership application (available at https://www.idecosystem.org/page/new-member-registration-form ) and a membership agreement will be mailed to you."
Kantara Initiative to Appear at HIMSS13 "New Orleans welcomes the 2013 HIMSS Annual Conference and Exhibition, March 3-7, 2013, at the Ernest N. Morial Convention Center. More than 36,000 healthcare industry professionals are expected to attend to discuss health information technology issues and review innovative solutions designed to transform healthcare."
First eID-Network Conference "Brussels, 20 March 2013 The first eID-Network Conference will be held on March 20th 2013 in the Egmont Palace in Brussels, in close cooperation with the annual EPCA Payment Summit. The eID network conference focuses on eID in relation to online services toward persons, businesses and governments. We believe eID and related concepts are crucial for advancing e-business transactions, therefore we refer to this as 'transactional eID'."
Dan Whaley: I Annotate: A Workshop "After two decades of progress in infrastructure and web technologies, we believe the time is finally at hand to realize the widespread annotation of human knowledge. On a recent call a suggestion was made to bring together people building annotation solutions with those that ultimately will use them. The obvious sensibility of that idea led a number of us to approach the Andrew W. Mellon Foundation for funding for a workshop, which they approved several weeks ago. We're calling it I Annotate, and it will be April 10-12, here in San Francisco, at the Fort Mason Center."
Internet Identity Workshop XVI #16 - 2013 "Phil Windley, Kaliya Hamlin, & Doc Searls Tuesday, May 7, 2013 at 8:00 AM - Thursday, May 9, 2013 at 4:00 PM (PDT) Mountain View, CA Super Early Bird Ticket Feb 18, 2013"
Call For Papers - Open Identity Summit 2013 "September 10th - 11th 2013, Kloster Banz, Germany Deadline for electronic submissions: May 15th, 2013 The aim of Open Identity Summit 2013 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing."
Nishant Kaushik: The Dilemma of the OAuth Token Collector "But what is far more interesting to consider are the ramifications this hack and Twitters response measures have had (or not had, depending on who you talk to) on the ecosystem that integrates with Twitter via it's OAuth implementation. This article brought up the fact that 3rd party apps authorized to interact with Twitter are still able to tweet despite the passwords being reset. In other words, the resetting of the password had no impact on whether they still had access to the account. Why is this important?"
Francois Lascelle: Enabling token distributors "In his post The dilemma of the oauth token collector, and in this twitter conversation, Nishant and friends comment on the recent twitter hack and discuss the pros and cons of instantly revoking all access tokens when a password is compromised. I hear the word of caution around automatically revoking all tokens at the first sign of a credential being compromised, but in a mobile world where UX is sacred and where each tapping of password can be a painful process, partial token revocation shouldn't automatically be ruled out."
Matt Jones: My problem with the "Internet Of Things" "Spimes and the Internet Of Things get used interchangeably in discussion these days, but I think it's worth making a distinction between things and spimes. That distinction is of course best put by the coiner of the term, Bruce Sterling - in his book which is the cause of so much of this ruckus, "Shaping Things"."