The document discusses enabling digital identity on the web. It provides an overview of identity technologies including Web 2.0, Identity 1.0, and Identity 2.0. OpenID is introduced as an open standard for decentralized digital identity. The document summarizes the design goals and components of OpenID, including authentication, discovery, messaging and attribute exchange. It highlights deployments of OpenID by relying parties and identity providers and promotes OpenID adoption through a developer bounty program.
Consumer Identity In A Multicultural SocietyAhmed Tharwat
This document discusses multicultural marketing and consumer identity. It notes that consumer identity is shaped by many social and cultural factors like age, gender, race, ethnicity, lifestyle and disability. Marketers are changing their strategies to satisfy the needs of different consumer groups in a multicultural society by developing cultural compatibility with target markets and communicating shared brand and social identities. The document provides an example of McDonald's using a matrix marketing strategy to target specific ethnic groups like African Americans and Latinos through tailored advertising and community support.
IAM for the Masses: Managing Consumer Identities ForgeRock
Lori Robinson, Gartner's Research VP for Identity & Privacy Strategies, presents a keynote on managing consumer identities at the 2014 IRM Summit in Phoenix, Arizona.
In this session we will look at how you can prepare your organization for Office 365, ranging from technical requirements for clients and servers to identity management. The session will focus on the core infrastructure of the Office 365 service.
This document discusses using public cloud resources for "context data" while reserving scarce resources like time, talent, and management attention for core data that provides a competitive advantage. It defines context data as things like supplier data, asset classifications, and geographic information that are less critical. The document advocates using open web identifiers and publishing systems to define master data entities externally rather than within individual organizations. This allows offsetting costs by leveraging public cloud resources for context data operations and synchronization.
The document discusses cloud identity and computing models. It describes the NIST definitions of cloud computing including service models like SaaS, PaaS, and IaaS as well as deployment models like private, public, community, and hybrid clouds. It then discusses identity issues related to each service model and hybrid clouds, focusing on administrative accounts, identity federation, application and platform identities, and challenges with directory services across deployment models.
Cloudonomics IP Monetization Conf - MalaysiaBash Badawi
Presentation on how Cloud Computing can offer businesses/academia a fast path to utilizing technology, secure IP findings, and profit from it via a market place exchange. Presented at the Malaysia IP Monetization Conference, June, 2010
Mobile Backend Apps and APIs meetup London overview of BaaS APIs and discussi...Taras Filatov
The first Mobile Backend Apps and APIs meetup has taken place in London on 16th of May 2012.
Taras Filatov, founder and CEO of QuickBlox has kicked off the event in an open discussion format giving a quick overview of existing market and asking questions about important aspects of mobile backends. Developers present in the audience have shared their opinions and this has launched a very interesting discussion from which both developers and API providers could take something.
Dan Murphy from Pearson and Terence Eden from InMobi have continued the discussion giving further introspective into evolution of apps and APIs and providing details about their APIs.
The official meetup page:
http://www.meetup.com/Mobile-Backend-Apps-and-APIs/events/49006492/
Consumer Identity In A Multicultural SocietyAhmed Tharwat
This document discusses multicultural marketing and consumer identity. It notes that consumer identity is shaped by many social and cultural factors like age, gender, race, ethnicity, lifestyle and disability. Marketers are changing their strategies to satisfy the needs of different consumer groups in a multicultural society by developing cultural compatibility with target markets and communicating shared brand and social identities. The document provides an example of McDonald's using a matrix marketing strategy to target specific ethnic groups like African Americans and Latinos through tailored advertising and community support.
IAM for the Masses: Managing Consumer Identities ForgeRock
Lori Robinson, Gartner's Research VP for Identity & Privacy Strategies, presents a keynote on managing consumer identities at the 2014 IRM Summit in Phoenix, Arizona.
In this session we will look at how you can prepare your organization for Office 365, ranging from technical requirements for clients and servers to identity management. The session will focus on the core infrastructure of the Office 365 service.
This document discusses using public cloud resources for "context data" while reserving scarce resources like time, talent, and management attention for core data that provides a competitive advantage. It defines context data as things like supplier data, asset classifications, and geographic information that are less critical. The document advocates using open web identifiers and publishing systems to define master data entities externally rather than within individual organizations. This allows offsetting costs by leveraging public cloud resources for context data operations and synchronization.
The document discusses cloud identity and computing models. It describes the NIST definitions of cloud computing including service models like SaaS, PaaS, and IaaS as well as deployment models like private, public, community, and hybrid clouds. It then discusses identity issues related to each service model and hybrid clouds, focusing on administrative accounts, identity federation, application and platform identities, and challenges with directory services across deployment models.
Cloudonomics IP Monetization Conf - MalaysiaBash Badawi
Presentation on how Cloud Computing can offer businesses/academia a fast path to utilizing technology, secure IP findings, and profit from it via a market place exchange. Presented at the Malaysia IP Monetization Conference, June, 2010
Mobile Backend Apps and APIs meetup London overview of BaaS APIs and discussi...Taras Filatov
The first Mobile Backend Apps and APIs meetup has taken place in London on 16th of May 2012.
Taras Filatov, founder and CEO of QuickBlox has kicked off the event in an open discussion format giving a quick overview of existing market and asking questions about important aspects of mobile backends. Developers present in the audience have shared their opinions and this has launched a very interesting discussion from which both developers and API providers could take something.
Dan Murphy from Pearson and Terence Eden from InMobi have continued the discussion giving further introspective into evolution of apps and APIs and providing details about their APIs.
The official meetup page:
http://www.meetup.com/Mobile-Backend-Apps-and-APIs/events/49006492/
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Squared Roof Technology provides software development, web development, and IT infrastructure management services. It has developed several software products for banking, education, healthcare, and government organizations. The document outlines the company's philosophy, services, software products, strengths, and client list.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions to companies in Australia. They have specialist teams with experience recruiting for IT roles in various industries. Reed Technology offers tailored recruitment and HR services including managing full recruitment processes, advising on candidate availability and salary expectations, and using technology tools to maximize the efficiency and quality of recruiting. Their global network allows them to tap into international candidate pools to meet clients' skills needs.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions. They recruit for a variety of IT roles across many industries. Reed Technology consultants have strong experience recruiting for IT teams and managing large recruitment exercises. They use a consultative approach and have established networks to identify candidates with diverse and in-demand skill sets to meet their clients' recruitment needs.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and can manage full recruitment processes. They have a large database of candidates and networks to source both local and international candidates. Reed Technology offers tailored recruitment and HR services and can work with clients of all sizes.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and can manage full recruitment processes. They have a large database of candidates and networks to source qualified candidates for clients.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and have established networks of candidates. They offer tailored recruitment and HR services to help clients attract and retain IT talent.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions to companies in Australia. They have specialist teams with experience recruiting for IT roles in various industries. Reed Technology offers tailored recruitment solutions and draws from a large database of candidates to help clients identify candidates with diverse and in-demand skillsets to meet their business needs.
Making sense of Microsoft Identities in a Hybrid worldJason Himmelstein
The New World of Identity Management. Are you struggling to making heads or tails of the identity options for hybrid Office 365, Azure & on-prem installations? Does the seemingly ever-changing landscape give you hives just thinking about the security implications? What are the recommended topologies & how in the world would you get started?
This document compares the security features of various content management systems (CMS), including Drupal, Joomla, WordPress, Liferay, and SharePoint. It discusses aspects like code repositories, APIs, security management models, roles and permissions, authentication methods, vulnerability assessment, hardening tools, monitoring, and recommended hosting platforms. For each CMS, details are provided about how they implement these various security controls and best practices. The document also mentions a past security incident where Drupal.org was compromised due to a breach in third-party software.
Robert Richardson from the Computer Security Institute gave a presentation on identity management systems at a conference session. There are many different identity standards being developed that could help users manage their online identities, such as OpenID, CardSpace, and SAML. However, it is difficult to determine which solutions are most important and how to discuss them in a way that facilitates understanding best practices. The presentation aimed to provide a framework for discussing digital identity management and determining the most useful solutions.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
The document provides an introduction to the Semantic Web by defining it in multiple ways: a) as a family of Web standards to make data easier to use and reuse, b) as an upgrade to the current Web enabling more intelligent applications, and c) as a collection of metadata technologies to improve business software adaptability and responsiveness. It notes what the Semantic Web is not (e.g. not a better search engine or tagged HTML) and provides examples of how the Semantic Web could benefit individuals by making their lives simpler and businesses by empowering new capabilities and reducing IT costs through standardized metadata linking. Finally, it discusses some early examples and implementations as well as next steps for exploring and prototyping with Semantic
This document discusses identity and authentication options for Office 365. It covers Directory Synchronization (DirSync) which synchronizes on-premises Active Directory with Azure Active Directory. It also discusses Active Directory Federation Services (ADFS) which provides single sign-on for federated identities and different ADFS topologies including on-premises, hybrid and cloud. Additionally, it covers Windows Azure Active Directory and how it can be used to provide identity services for cloud applications. The key takeaways are to check Active Directory health before using DirSync, understand the different Office 365 authentication flows with ADFS, and that WAAD can extend identity functionality to websites.
Office 365 is Microsoft's cloud-based productivity suite that provides email, calendaring, document creation and sharing, video conferencing, and more. It offers various versions including E1, E3, and E4 that provide different feature sets for different organization sizes and needs. Office 365 offers hybrid deployment options that allow integration with on-premises Exchange and Lync servers. It provides a more full-featured suite compared to competitors like Google Apps.
An approachable overview of Amazon and the range services offered by Amazon Web Services. This presentation was given to the Worthing Digital meetup group on Feb 20th 2018
This document provides an introduction and overview of Neo4j and graph databases. It begins with an explanation of the limitations of relational databases in modeling relationships and includes slides on Neo4j's native graph data model and architecture. Additional slides cover Neo4j use cases, modeling with graphs, the Neo4j platform and features like the cloud, drivers, and visualization tools. The document concludes with examples of recommender systems queries in Cypher.
The document summarizes job opportunities in infrastructure and IT fields including system engineers, network engineers, help desk analysts, and security roles. It also lists relevant skills and experience working for technology companies. Finally, it outlines the author's background in New York City recruiting and their interest in a new position at a boutique or agency recruitment firm in Manhattan.
This document discusses the evolution of service-oriented architectures (SOAs) and how identity management plays a key role. Early SOAs like CORBA and DCOM struggled with security. Web services improved on this with standards like WS-Security and SAML tokens. More recent approaches like OpenID, OAuth, and federated identity management improved user-centric security and access control. Future SOAs may utilize attribute-based access control at large scales across organizations. Overall, the document traces how security for SOAs transitioned from platform-specific to user-centric and interoperable across the Internet.
1) File uploads in PHP require configuring php.ini settings like enabling file uploads and setting temporary storage directories with correct permissions.
2) Forms for file uploads need to use POST with multipart/form-data encoding and include file input fields and hidden fields.
3) PHP stores uploaded files in the $_FILES array, including the temporary filename, size, type, and original name, which can then be processed and moved to a permanent location.
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
The Apache::Test framework allows running and developing tests for Apache modules and products. Key features include:
- Running existing tests through the t/TEST program
- Setting up a new testing environment by installing Apache::Test and generating a Makefile
- Developing new tests by writing Perl scripts that use Apache::Test functions and assert results
- Options for running tests individually, repeatedly without restarts, or in parallel on different ports
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
http://ssimeetup.org/overlays-1o1-establishing-schema-definitions-self-sovereign-identity-ssi-ecosystem-paul-knowles-webinar-17/
Paul Knowles, Innovation & Emerging Technology at Dativa and chair of the Schemas and Overlays Working Group at Sovrin Foundation, will be our next guest presenting a new data capture model to the global SSI (Self-Sovereign Identity) community.
This talk introduces Overlays, data structures that provide extra layers of contextual and/or conditional information to Schemas. Paul will show how Overlays ensure that Schema definitions can remain in their simplest form thus providing a standard base from which to decentralise data. The extra context provided by Overlays can be used by an Agent to transform how information is displayed to a viewer or to guide the Agent in how to apply a custom process to Schema data. All components within this flexible data capture architecture contain DIDs (Decentralised Identifiers) for linked association and search purposes.
The presentation will also include a live demonstration from *Robert Mitwicki from Lab10 Collective* to show how a set of Overlays can be added to a plain Schema to provide richer complexity to the base structure.
Squared Roof Technology provides software development, web development, and IT infrastructure management services. It has developed several software products for banking, education, healthcare, and government organizations. The document outlines the company's philosophy, services, software products, strengths, and client list.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions to companies in Australia. They have specialist teams with experience recruiting for IT roles in various industries. Reed Technology offers tailored recruitment and HR services including managing full recruitment processes, advising on candidate availability and salary expectations, and using technology tools to maximize the efficiency and quality of recruiting. Their global network allows them to tap into international candidate pools to meet clients' skills needs.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions. They recruit for a variety of IT roles across many industries. Reed Technology consultants have strong experience recruiting for IT teams and managing large recruitment exercises. They use a consultative approach and have established networks to identify candidates with diverse and in-demand skill sets to meet their clients' recruitment needs.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and can manage full recruitment processes. They have a large database of candidates and networks to source both local and international candidates. Reed Technology offers tailored recruitment and HR services and can work with clients of all sizes.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and can manage full recruitment processes. They have a large database of candidates and networks to source qualified candidates for clients.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals. They recruit for a variety of IT roles across many industries. Reed Technology consultants have expertise recruiting for IT teams and have established networks of candidates. They offer tailored recruitment and HR services to help clients attract and retain IT talent.
Reed Technology is a leading specialist recruiter that provides recruitment services for IT professionals in permanent, contract, and temporary positions to companies in Australia. They have specialist teams with experience recruiting for IT roles in various industries. Reed Technology offers tailored recruitment solutions and draws from a large database of candidates to help clients identify candidates with diverse and in-demand skillsets to meet their business needs.
Making sense of Microsoft Identities in a Hybrid worldJason Himmelstein
The New World of Identity Management. Are you struggling to making heads or tails of the identity options for hybrid Office 365, Azure & on-prem installations? Does the seemingly ever-changing landscape give you hives just thinking about the security implications? What are the recommended topologies & how in the world would you get started?
This document compares the security features of various content management systems (CMS), including Drupal, Joomla, WordPress, Liferay, and SharePoint. It discusses aspects like code repositories, APIs, security management models, roles and permissions, authentication methods, vulnerability assessment, hardening tools, monitoring, and recommended hosting platforms. For each CMS, details are provided about how they implement these various security controls and best practices. The document also mentions a past security incident where Drupal.org was compromised due to a breach in third-party software.
Robert Richardson from the Computer Security Institute gave a presentation on identity management systems at a conference session. There are many different identity standards being developed that could help users manage their online identities, such as OpenID, CardSpace, and SAML. However, it is difficult to determine which solutions are most important and how to discuss them in a way that facilitates understanding best practices. The presentation aimed to provide a framework for discussing digital identity management and determining the most useful solutions.
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
How can we leverage on distributed ledger technology and cryptography to provide identity as a global, cross-jurisdiction and accessible utility for the world?
The document provides an introduction to the Semantic Web by defining it in multiple ways: a) as a family of Web standards to make data easier to use and reuse, b) as an upgrade to the current Web enabling more intelligent applications, and c) as a collection of metadata technologies to improve business software adaptability and responsiveness. It notes what the Semantic Web is not (e.g. not a better search engine or tagged HTML) and provides examples of how the Semantic Web could benefit individuals by making their lives simpler and businesses by empowering new capabilities and reducing IT costs through standardized metadata linking. Finally, it discusses some early examples and implementations as well as next steps for exploring and prototyping with Semantic
This document discusses identity and authentication options for Office 365. It covers Directory Synchronization (DirSync) which synchronizes on-premises Active Directory with Azure Active Directory. It also discusses Active Directory Federation Services (ADFS) which provides single sign-on for federated identities and different ADFS topologies including on-premises, hybrid and cloud. Additionally, it covers Windows Azure Active Directory and how it can be used to provide identity services for cloud applications. The key takeaways are to check Active Directory health before using DirSync, understand the different Office 365 authentication flows with ADFS, and that WAAD can extend identity functionality to websites.
Office 365 is Microsoft's cloud-based productivity suite that provides email, calendaring, document creation and sharing, video conferencing, and more. It offers various versions including E1, E3, and E4 that provide different feature sets for different organization sizes and needs. Office 365 offers hybrid deployment options that allow integration with on-premises Exchange and Lync servers. It provides a more full-featured suite compared to competitors like Google Apps.
An approachable overview of Amazon and the range services offered by Amazon Web Services. This presentation was given to the Worthing Digital meetup group on Feb 20th 2018
This document provides an introduction and overview of Neo4j and graph databases. It begins with an explanation of the limitations of relational databases in modeling relationships and includes slides on Neo4j's native graph data model and architecture. Additional slides cover Neo4j use cases, modeling with graphs, the Neo4j platform and features like the cloud, drivers, and visualization tools. The document concludes with examples of recommender systems queries in Cypher.
The document summarizes job opportunities in infrastructure and IT fields including system engineers, network engineers, help desk analysts, and security roles. It also lists relevant skills and experience working for technology companies. Finally, it outlines the author's background in New York City recruiting and their interest in a new position at a boutique or agency recruitment firm in Manhattan.
This document discusses the evolution of service-oriented architectures (SOAs) and how identity management plays a key role. Early SOAs like CORBA and DCOM struggled with security. Web services improved on this with standards like WS-Security and SAML tokens. More recent approaches like OpenID, OAuth, and federated identity management improved user-centric security and access control. Future SOAs may utilize attribute-based access control at large scales across organizations. Overall, the document traces how security for SOAs transitioned from platform-specific to user-centric and interoperable across the Internet.
1) File uploads in PHP require configuring php.ini settings like enabling file uploads and setting temporary storage directories with correct permissions.
2) Forms for file uploads need to use POST with multipart/form-data encoding and include file input fields and hidden fields.
3) PHP stores uploaded files in the $_FILES array, including the temporary filename, size, type, and original name, which can then be processed and moved to a permanent location.
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
The Apache::Test framework allows running and developing tests for Apache modules and products. Key features include:
- Running existing tests through the t/TEST program
- Setting up a new testing environment by installing Apache::Test and generating a Makefile
- Developing new tests by writing Perl scripts that use Apache::Test functions and assert results
- Options for running tests individually, repeatedly without restarts, or in parallel on different ports
This document provides instructions on installing and configuring memcached to improve the performance and scalability of MySQL. Memcached is installed using package managers or by compiling from source. It is configured to listen on ports and interfaces, allocate memory, and set thread counts. The typical usage involves applications loading data from MySQL into memcached for faster retrieval, with MySQL as the backing store if data is not found in the cache.
The document discusses Novell iChain, a solution for securing web applications and servers. It provides single sign-on, encrypts data as it passes through proxies, and removes direct access to web servers. It authenticates users through LDAP or certificates and authorizes access through rules stored in eDirectory. This simplifies management and security across multiple web server platforms and applications.
Load-balancing web servers Load-balancing web serverswebhostingguy
The document discusses different approaches to load balancing web servers to address issues like scaling performance, tolerating failures, and rolling upgrades. It describes three common solutions: redirecting requests through a front-end server; using round-robin DNS to distribute requests; and employing an intelligent load balancer switch that can distribute requests based on server load and detect failures. Each approach has advantages and disadvantages related to ease of implementation, visibility to users, and ability to handle session state. The document also discusses network designs and protocols involved in load balancing, including TCP connection setup and teardown.
The document compares three methods for consolidating SQL Server databases: 1) multiple databases on a single SQL Server instance, 2) a single database on multiple SQL Server instances, and 3) hypervisor-based virtualization. It finds that consolidating multiple databases onto a single instance has the lowest direct costs but reduces security and manageability. Using multiple instances improves security but has higher resource needs. Hypervisor-based virtualization maintains security while enabling features like high availability, but has higher licensing costs. The document aims to help decide which approach best balances these technical and business factors for a given environment.
Mod_perl brings together the Apache web server and Perl programming language. It allows Apache to be configured and extended using Perl, and significantly accelerates dynamic Perl content. Mod_perl supports Apache versions 1.3 and 2.x and integrates Perl at every stage of the request process to provide great flexibility and control over Apache functionality. The mod_perl community provides extensive documentation and quick support responses.
Mod_perl brings together the Apache web server and Perl programming language. It allows Apache to be configured and extended using Perl, and significantly accelerates dynamic Perl content. Mod_perl supports Apache versions 1.3 and 2.x and integrates Perl at every stage of the request process to provide great flexibility and control over Apache functionality. The mod_perl community provides extensive documentation and quick support responses.
The document discusses various aspects of designing an effective website, including analyzing content and target audiences, organizing site structure and navigation, and implementing design elements. The key steps outlined are to analyze content and audience needs, organize the site structure into main sections and subsections, and implement an intuitive navigation system to help users easily find relevant information. Maintaining and optimizing the site over time are also emphasized.
This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 with Microsoft Windows Server 2008 on Dell PowerEdge servers and Dell storage systems. It documents best practices for implementing SQL Server 2005 solutions using Dell hardware and software components that have been tested and validated to help ensure successful deployment and optimal performance. The white paper covers storage configuration, network configuration, operating system configuration, and SQL Server configuration recommendations.
1. The document discusses the evolution of business models for IT infrastructure from proprietary systems within individual companies to more open standards and shared infrastructure leveraging the internet.
2. It describes new service models like client-server computing, web services, and on-demand/utility computing which allow flexible provisioning of computing resources on a needs basis.
3. Managing diverse IT infrastructures requires considerations around outsourcing non-core functions, developing service level agreements, managing legacy systems, and aligning infrastructure capabilities to business strategy through appropriate investment.
The document discusses different types of websites that can be created for business purposes including traditional, blog-based, and group/network sites. It provides information on setting up each type of site for free or at low cost using online tools or designers, and how to add features like domains, payment systems, and linking domains to sites. Options for free and cheap site creation using tools like Google Sites are demonstrated.
This document outlines Saint Louis University's strategy for improving power management of IT equipment to reduce costs and environmental impact. Key points include:
1) SLU aims to standardize power-optimized default settings on all managed PCs and laptops through automated software and establish policies around exceptions and existing devices.
2) Potential savings are estimated from generational improvements in computer hardware and adopting lower-power modes like sleep versus screensavers.
3) The strategy also involves consolidating servers, enabling energy-efficient settings on printers and other electronics, and establishing institutional goals around student computer energy use.
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
This document provides instructions for using Microsoft SQL and Excel to extract data from a SmartSite SQL database, manipulate it in Excel using functions, and update the SQL tables with the modified data to streamline content work. It covers connecting to and querying SQL databases, common Excel functions for editing data, and steps for importing an Excel file into a SQL table to update information. Examples of specific SQL queries and Excel functions are provided along with a scenario walking through the full process.
The document discusses various topics related to virtualization including drivers for virtualization, practical applications, definitions of terms like virtualization and paravirtualization, and tools like Xen, VMWare, and Microsoft virtualization products. It provides information on installing and configuring Xen on SuSE Linux, discusses security and auditing considerations for Xen, and demonstrates Xen functionality.
The document discusses strategies for converting low-value hosting clients into high-value customers by marketing additional services. It recommends continuously marketing to clients through email, forums, blogs and surveys to promote add-on services like collaboration tools, applications, and infrastructure-as-a-service offerings which can significantly increase revenue per client. Measuring marketing campaigns and conversions is key to optimizing efforts to up-sell existing clients.
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
The document discusses WebMapping Solutions and their products and services. It summarizes their middleware and mapping tools like MapBroker, Generic GUI Builder, and MapOrganiser. MapBroker powers many of their applications. Their products allow users to build custom web mapping applications and manage both geographic and non-geographic data in a single view. Their services include publishing data online, application development, and strategic consulting. Some examples of government and organization clients are listed.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
4. Web 2.0
+ Users in Control
+ Data Sharing
+ Social Networking
+ Collaboration Tools
+ Lightweight Business Models
+ Perpetual Beta
+ The Long Tail
+ Application Platform
5. What is Identity?
“The collective aspect of the set of characteristics by which
a thing is definitively recognizable or known.”
-Dictionary.com
6. Offline Identity
+ David Recordon
+ 09/04/1986
+ Oregon
+ Black Hair and Brown Eyes
+ Central Pocket Loop
+ Size 12 Shoes
+ Drive a Subaru
+ Work for VeriSign
+ Star Alliance Gold
+ AOW Scuba Diver
+ CPR / AED / First Aid Trained
+ etc
8. Identity…why do we need technology?
+ Accuracy
▪ Biometrics
+ Convenience
▪ Verification
+ Security
▪ Authorization
+ Privacy
▪ Limited Disclosure
+ Portability
▪ HSPD-12
9. Identity 1.0 on the Web
+ Proprietary
▪ AOL
▪ Yahoo!
▪ Microsoft
▪ Google
+ Segregated
+ Federation
+ Little User Choice
+ Many Usernames
+ Few Passwords
10. Identity 2.0
+ Internet Scale
▪ Decentralized
+ Privacy Protecting
▪ Disclose only as much as is needed
+ Easy to Adopt
▪ Add to your application in a weekend
+ Community Driven
▪ Open Source development
11. and that means…
+ User Choice
▪ Who hosts their identity
+ Collaboration
▪ Moving between contexts
+ The Long Tail
▪ Identity is more than just “Military Grade”
+ Emerging Business Models
+ Supporting the Web as an Application Framework
12. Forums and Conferences
+ ACM
+ Apache Software Foundation
+ BarCamp
+ Digital ID World conference
+ Eclipse Foundation
+ ID World conference
+ Identity Commons
+ Internet Identity Workshop series
+ IETF
+ Liberty Alliance
+ O’Reilly’s OSCON, eTech, FooCamp, and Web 2.0 conferences
+ OASIS
+ OSIS
+ W3C
13. “Competitive” Situation
• Red Hat
• Red Hat
Identifier-based • Novell
• Novell
paradigm • VeriSign
• VeriSign
URL-based
URL-based • Sun
• Sun
(grassroots, open
(grassroots, open
• IBM
• IBM
source, blogging)
source, blogging)
• Microsoft
• Microsoft
• Cordance
• Cordance
• Higgins
• Higgins
• Shibboleth
• Shibboleth
OSIS Agreement • Sxip
• Sxip
“historic development” (ZDNet) • NetMesh
• NetMesh
Identity • Oracle
• Oracle
Invisible in 2006 Card-based
to the user paradigm
Liberty-based
Liberty-based WS-*-based
WS-*-based
(Liberty Alliance
(Liberty Alliance (Microsoft
(Microsoft
companies)
companies) Vista)
Vista)
14. Identity 2.0 Technologies
+ Higgins Identity Framework
▪ Not a protocol
▪ FOSS via Eclipse Foundation
+ SAML
▪ Liberty Alliance
▪ Fewer Open Source implementations
+ Microsoft CardSpace
▪ Developed by Microsoft and will ship in Windows Vista
▪ Part of .Net
+ OpenID
▪ Protocol framework (Discovery, Authentication, Data Exchange, …)
▪ Decentralized
▪ FOSS via Apache Software Foundation
15. CardSpace Overview
+ Simple user abstraction for digital identity
▪ For managing collections of claims
▪ For managing keys for sign-in and other uses
+ Grounded in real-world metaphor of physical cards
▪ Government ID card, driver’s license, credit card, membership card,
etc…
▪ Self-issued cards signed by user
▪ Managed cards signed by external authority
+ Shipping in Windows Vista
▪ Runs on Windows Vista, XP, and Server 2003
+ Implemented as protected subsystem
16. Implementation Properties
+ Cards represent references to identity providers
▪ Cards have:
– Address of identity provider
– Names of claims
– Required credential
▪ Not claim values
+ CardSpace data not visible to applications
▪ Stored in files encrypted under system key
▪ User interface runs on separate desktop
+ Simple self-issue identity provider
▪ Stores name, address, email, telephone, age, gender
▪ No high value information
▪ User must opt-in
17. WS-* Metasystem Architecture
ID Provider Relying Party ID Provider Relying Party
Kerberos SAML x509 …
Security Security
Token WS-SecurityPolicy Token WS-SecurityPolicy
Service Service
WS-Trust, WS-MetadataExchange
Identity Selector
Subject
19. What was OpenID 1.1?
+ An identity authentication system
+ A protocol
▪ gratis, libre
+ Not a service or company
▪ Not Passport
▪ Not TypeKey
+ Survives if companies turn evil or go out of business
20. Design Goals For Auth
+ Low barrier to entry
▪ Works with static HTML pages
▪ Decentralized
▪ Understandable identity (a URI)
– No new namespace
– No public keys (key revocation, etc...)
▪ No SSL required
▪ No browser plugins
+ Most simple protocol possible
▪ Other needs layered atop
21. What is OpenID 2.0?
+ An identity system framework
+ Multiple protocols
▪ Discovery (Yadis)
▪ Authentication
– URIs
▪ Messaging (DTP)
▪ Attribute Exchange
+ Still not a service or company
+ Open community development within the Apache Heraldry Podling
+ General consensus based spec process on specs@openid.net
22. Design Goals For OpenID 2.0
+ Identity 2.0
▪ User Centric
▪ Internet Scale
▪ Privacy Protecting
▪ Community Driven
+ Framework of interoperable specifications
▪ Handful of twenty page specs versus one one-hundred-fifty page spec
+ Extensible
+ Interoperable
24. How's Auth Work?
+ Proves “who” you are
▪ You own a URL or an i-name
▪ One-time assertions w/ digital signature
▪ See openid.net for specs, libraries, etc
+ Not a trust system…yet
▪ Spammers can/will/have setup OpenID Authentication servers
▪ Better than the state of email today
▪ Trust/reputation providers can easily build atop the OpenID framework
25. Why Should You Care?
+ Developers
▪ Less code since don’t need
– Complex registration pages
– Security questions
– Password reset emails
▪ FOSS libraries already exist
+ Product Managers
▪ Low barrier to entry
▪ Promote your brand (http://username.YourSite.com)
+ Users
▪ One password
– Or other credentials
▪ Simple
▪ Globally recognizable identity
27. Developer Bounty Program
+ Implement OpenID 2.0 support
+ Are distributed as part of a project’s core
+ Project distributed under an OSI-approved license
+ Serve at least 200,000 internet users or 5,000 downloads per month
+ Require no more than one configuration setting for an administrator
to enable support
+ Include the OpenID logo in the signon form
+ http://IWantMyOpenID.org
28. Code!
+ Free libraries on OpenID.net
▪ PHP
▪ Perl
▪ Python
▪ C#
▪ Ruby
▪ Java
▪ C++
+ Similar API across languages
+ Hides low level details of the protocol
31. Discovery on http://recordond.pip.verisignlabs.com
<Service>
<Type>http://openid.net/signon/1.1</Type>
<Type>http://openid.net/sreg/1.0</Type>
<URI>https://pip.verisignlabs.com/server</URI>
</Service>
Simple XML which describes the authoritative provider for my URL
32.
33.
34.
35.
36.
37. Dress Shirt as a Website
The button that comes
with the shirt is like the
login mechanism for
that site.
The hole in the cuff
provides user choice in
where their Identity is
managed.
39. PHP Relying Party Example (index.html)
<body>
<h1>PHP OpenID Authentication Example</h1>
<p>
This example consumer uses the <a
href="http://www.openidenabled.com/openid/libraries/php/">PHP
OpenID</a> library. It just verifies that the URL that you enter
is your identity URL.
</p>
<?php if (isset($msg)) { print "<div class="alert">$msg</div>"; } ?>
<?php if (isset($error)) { print "<div class="error">$error</div>"; } ?>
<?php if (isset($success)) { print "<div class="success">$success</div>"; } ?>
<div id="verify-form">
<form method="get" action="try_auth.php">
Identity URL:
<input type="hidden" name="action" value="verify" />
<input type="text" name="openid_url" value="" />
<input type="submit" value="Verify" />
</form>
</div>
</body>
40. PHP Relying Party Example (try_auth.php)
$openid = $_GET['openid_url'];
$process_url = sprintf("http://%s:%s%s/finish_auth.php",
$_SERVER['SERVER_NAME'], $_SERVER['SERVER_PORT'],
dirname($_SERVER['PHP_SELF']));
$trust_root = sprintf("http://%s:%s%s",
$_SERVER['SERVER_NAME'], $_SERVER['SERVER_PORT'],
dirname($_SERVER['PHP_SELF']));
// Begin the OpenID authentication process.
$auth_request = $consumer->begin($openid);
if (!$auth_request) {
$error = "Authentication error.";
include 'index.php';
exit(0);
}
$auth_request->addExtensionArg('sreg', 'optional', 'email');
$redirect_url = $auth_request->redirectURL($trust_root, $process_url);
header("Location: ".$redirect_url);
41. PHP Relying Party Example (finish_auth.php)
$response = $consumer->complete($_GET);
if ($response->status == Auth_OpenID_CANCEL) {
$msg = 'Verification cancelled.';
} else if ($response->status == Auth_OpenID_FAILURE) {
$msg = "OpenID authentication failed: " . $response->message;
} else if ($response->status == Auth_OpenID_SUCCESS) {
$openid = $response->identity_url;
$esc_identity = htmlspecialchars($openid, ENT_QUOTES);
$success = sprintf('You have successfully verified ' .
'<a href="%s">%s</a> as your identity.',
$esc_identity, $esc_identity);
$sreg = $response->extensionResponse('sreg');
if (@$sreg['email']) {
$success .= " You also returned '".$sreg['email']."' as your email.";
}
}
include 'index.php';
42. Questions?
David Recordon
drecordon@verisign.com
http://openid.net/
general@openid.net
December 4-6 in Mountain View CA
InternetIdentityWorkshop.net
Thanks to Kaliya Hamlin, Johannes Ernst, and Mike Jones for letting me use some of their slides