Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 247 by Mark Dixon tagged identity

As a holder of a lowly exhibit pass at the Gartner IAM Summit, the only conference session where I was officially welcomed was the Oracle vendor session, where Amit Jasuja, Vice President, Oracle Iden...

Share It With Others!

Several years ago, before Facebook and LinkedIn became household names, a partner and I formed a company named “Network Handshake LLC” and proceeded to develop a bit of social networking software call...

Share It With Others!

According to a CNNMoney.com article today, “An international cybercrime ring was broken up Thursday by federal and state officials who say the alleged hackers used phony e-mails to obtain personal...

Share It With Others!

I first met Alan Norquist back in 2000 while we worked together at Ponte Communications, a dot-com startup that lured me away from my first stint at Oracle.  Ironically, Alan came to Ponte direc...

Share It With Others!

Dave Kearns of Network World posted a thought-provoking article today,  “Data breach demonstrates need for access control policies.” Highlighting a case where a tax collector in British Columb...

Share It With Others!

Note: originally published in I Love Freedom. According to a recent post in the International Business Edge, the small town of Sequim, WA, has an Identity Crisis … big time: “The U.S. town of Seq...

Share It With Others!

Presentation by Gerry Gebel of Axiomatics at Kantara workshop. Includes good overview of XACML and coverage of v3.0 enhancements. Technorati Tags: XACML,Policy,Information Security,Indentity,Identi...

Share It With Others!

On June 25, 2010, the US Federal Government released a draft document entitled, “National Strategy for Trusted Identities in Cyberspace.” This document proposes a strategy that: … defines and prom...

Share It With Others!

Thanks to Malisa Vincenti, leader of the LinkedIn Group Security & Technology - Critical Infrastructure Network & Forum, for highlighting the CNN article entitled “Why face recognition isn't s...

Share It With Others!

I am pleased to announce the official public webcast introducing Oracle Identity Management 11g. Amit Jasuja,  Oracle’s Vice President Identity Management and Security Products, will lead the di...

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT