Your SlideShare is downloading. ×
Tnc2012 nh
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Tnc2012 nh

299

Published on

Presentation at TNC2012.

Presentation at TNC2012.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
299
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Oh the Places You’ll Go! Identity Management and the Online Journey TNC2012 Nicole Harris UK Access Management Focus, JISC Advance @nicoleharrisSlides: http://www.slideshare.net/nicolevharris Bookmarks: goo.gl/9oOAQ
  • 2. Me• UK Access Management Focus;• Advisor to UK federation;• REFEDS Coordinator;• PEER Project Manager;• Shibboleth Consortium Manager;• Generally opinionated about access and identity.
  • 3. In the Beginning
  • 4. Hacker Ethics• Access to computers should be unlimited and total.• Always yield to the Hands-On Imperative.• All information should be free.• Mistrust authority–promote decentralization.• Hackers should be judged by their hacking.• You can create art and beauty on a computer.• Computers can change your life for the better.
  • 5. The Facebook Effect
  • 6. What about the web?
  • 7. “Many of the discussions of the future at CERNand the LHC era end with the question - Yes, but how will we ever keep track of such a large project? This proposal provides an answer tosuch questions. Firstly, it discusses the problem of information access at CERN. Then, it introduces the idea of linked information systems, and compares them with less flexible ways of finding information.”
  • 8. “Discussions on Hypertext have sometimestackled the problem of copyright enforcement and data security. These are of secondary importance at CERN, where information exchange is still more important than secrecy. Authorisation and accounting systems forhypertext could conceivably be designed which are very sophisticated, but they are not proposed here.”
  • 9. Where do we go from here?
  • 10. Why the big secret? People are smart. They can handle it.
  • 11. A person is smart. People are dumb, panicky dangerous animals and you know it. Fifteenhundred years ago everybody knew the Earthwas the center of the universe. Five hundred years ago, everybody knew the Earth was flat, and fifteen minutes ago, you knew that humans were alone on this planet. Imagine what youll know tomorrow.
  • 12. How do you see the Internet?
  • 13. A JISC Advance employee, who will now be employed to draw all of my slides…
  • 14. A 19 year old University student.
  • 15. An NREN employee.
  • 16. Nicole’s Mum.
  • 17. A University staff member and vociferous tweeter.
  • 18. Tenants of Security
  • 19. Usability
  • 20. Security
  • 21. Privacy
  • 22. • Drop the drama.• Follow the crowd.• Ditch the ticks.
  • 23. So...be your name Buxbaum or Bixby or Bray or Mordecai Ali Van Allen OShea, youre off to Great Places! Today is your day! Your mountain is waiting. So...get on your way! Thank you for listening.

×