Friday, March 20, 2009

digital identity

For my first post on our joined blog i would like to introduce the 'i' in our blog-name: Identity.

I will write about a book that bares the same title as this blogpost, Digital Idenitity, that's all about...you guessed it, digital idenitity!
Although this book is 'old' in IT-terms (2005) ,I still recon this book is a very good introduction to some of the concepts and terms used by the people working with IAM.

The writer of this book, Phil Windley, compares some of the company CIO's and CTO's too medieval rulers, concerned only with the risks they adopted a siege mentality with building walls to keep attackers out, making a secure perimeter but hampering the commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible.

He also details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. To refrase this, he also uses the same medieval comparisons (he does this throughout his book by the way). IMA is good city planning: Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings-or system architectures-function as part of the overall plan.

In a nutshell this book shows that security planning can be used to support business goals and opportunities, rather than holding them at bay.

Wednesday, March 18, 2009

MS Techdays Belux 2009: a personal journey



2days, 12 sessions


{You Shape} Your Knowledge.

At least that’s Microsoft’s opinion about this year’s Belux Techdays.
my visit at the techdays with great expectations.

an overview of the sessions attended by me

wednesday:

Key note: Architectural Principles for Software + Services

By Miha Kralj

System Center Configuration Manager 2007: A Technical Overview

By Jeff Wettlaufer

Windows 7 Enterprise Features Overview

By Tony Krijnen & Daniel Van Soest

Kick The Bad Guys out of your infrastructure

By Ronny Bjones

Privacy: The Why, What, and how

By Kai Axford

Virtualization and Security: What does it mean for me?

By Kai Axford


Thursday:


Hyper-V: Notes from the Field

By Ronald Beekelaar

SYSVOL Replication - Should you use File Replication (FRS) or Distributed Files System-Replication?

(DFS-R) and How to Migrate?

By Rhonda Layfield

The Evolution of object recovery in AD - From Basics to Perfection - A Technical Deep Dive

By Jorge De Almeida Pinto

Group Policy Infrastructure in Windows: Today & Tomorrow

By Kurt Roggen

SharePoint patching - Notes from the field

By Sam Hassani

Protecting your network: NAP, IPSec and Server & Domain Isolation

By Ronald Beekelaar


I will discuss all of the above sessions in a detailed manner in my future posts