Friday, March 20, 2009
digital identity
I will write about a book that bares the same title as this blogpost, Digital Idenitity, that's all about...you guessed it, digital idenitity!
Although this book is 'old' in IT-terms (2005) ,I still recon this book is a very good introduction to some of the concepts and terms used by the people working with IAM.
The writer of this book, Phil Windley, compares some of the company CIO's and CTO's too medieval rulers, concerned only with the risks they adopted a siege mentality with building walls to keep attackers out, making a secure perimeter but hampering the commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible.
He also details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. To refrase this, he also uses the same medieval comparisons (he does this throughout his book by the way). IMA is good city planning: Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings-or system architectures-function as part of the overall plan.
In a nutshell this book shows that security planning can be used to support business goals and opportunities, rather than holding them at bay.
Wednesday, March 18, 2009
MS Techdays Belux 2009: a personal journey
2days, 12 sessions
{You Shape} Your Knowledge.
At least that’s Microsoft’s opinion about this year’s Belux Techdays.
my visit at the techdays with great expectations.
an overview of the sessions attended by me
wednesday:
Key note: Architectural Principles for Software + Services
By Miha Kralj
System Center Configuration Manager 2007: A Technical Overview
By Jeff Wettlaufer
Windows 7 Enterprise Features Overview
By Tony Krijnen & Daniel Van Soest
Kick The Bad Guys out of your infrastructure
By Ronny Bjones
Privacy: The Why, What, and how
By Kai Axford
Virtualization and Security: What does it mean for me?
By Kai Axford
Thursday:
Hyper-V: Notes from the Field
By Ronald Beekelaar
SYSVOL Replication - Should you use File Replication (FRS) or Distributed Files System-Replication?
(DFS-R) and How to Migrate?
By Rhonda Layfield
The Evolution of object recovery in AD - From Basics to Perfection - A Technical Deep Dive
By Jorge De Almeida Pinto
Group Policy Infrastructure in Windows: Today & Tomorrow
By Kurt Roggen
SharePoint patching - Notes from the field
By Sam Hassani
Protecting your network: NAP, IPSec and Server & Domain Isolation
By Ronald Beekelaar