Remove Architecture Remove Authentication Remove Reference
article thumbnail

The Architecture of Identity Systems

Phil Windley

Summary: The architecture of an identity system has a profound impact on the nature of the relationships it supports. This blog post uses terminology and ideas from Sam's paper to classify and analyze three different identity system architectures. The controller might be the subject that the identifier refers to, but not necessarily.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

Although big data doesn’t refer to any specific quantity, the term is often used when speaking about petabytes and exabytes of data. 3-D printing is known by many names; depending upon the context, the term may also be referred to as rapid prototyping, stereolighography, architectural modeling or additive manufacturing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Authentic Digital Relationships

Phil Windley

In his article Architecture Eats Culture Eats Strategy , Tim Bouma makes the point that the old management chestnut Culture Eats Strategy leaves open the question: how do we change the culture. Tim's point is that architecture (in the general sense) is the upstream predator to culture. This is their fundamental architecture.

article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Referring back to the CAC, and SmartCards in general, the National Institute of Standards and Technology (NIST) has published a draft of Special Publication (SP) 800-157, “ Guidelines for Derived Personal Identity Verification (PIV) Credentials.”. Anything that slows you down, like having to enter a PIN to unlock your phone, is friction.

Security 249
article thumbnail

Balancing Resource Sharing in Multi-tenant Architectures with Single-tenant Services

KineticData

Understanding the Landscape In multi-tenant architectures, resources such as computing power, databases, and network resources are shared among various users or clients, referred to here as tenants. The post Balancing Resource Sharing in Multi-tenant Architectures with Single-tenant Services appeared first on Kinetic Data.

article thumbnail

Five areas where EA matters more than ever

CIO Business Intelligence

The discipline of enterprise architecture (EA) is often criticized for forcing technology choices on business users or producing software analyses no one uses. Forrester Research has identified more than 20 types of enterprise architecture roles being used by its clients.

CTO Hire 122
article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. Provides architectures for businesses worldwide that can tie mainframes, distributed systems and specialty appliances in a cohesive end to end solution.

IBM 107