Identity

In this article, I will explain how to match a user with incomplete information using the Levenshtein distance algorithm to identify enough similarity. The problem…

By: kuronen
Nov 18, 2016
12:32 pm
Reads:
860
Score:
Unrated

Gartner predicts that by the year 2020, 26 billion devices will be connected to the Internet. All of these devices will make up the “things” of the oft-discussed Internet of Things (IoT). And the use of these connected devices, which can all communicate with each other, continues to expand. Even industries and communities that we…

+ read more

GeoffWebb
By: GeoffWebb
Jul 30, 2015
7:06 am
Reads:
8,628
Score:
4

Standing in a long line can be reason enough for most people to avoid doing something, even if it’s something important like voting for government leaders. To increase participation, many are in favor of adopting an online voting platform to make voting easier and more convenient for citizens. After all, even the U.S. Department of…

+ read more

GeoffWebb
By: GeoffWebb
Jul 21, 2015
7:07 am
Reads:
7,465
Score:
Unrated

I’ve been asked a few times about the purpose of various policysets; for what purpose do we have this one vs. that one? Why Event vs. Command, or Creation vs. Placement? There are reasons for all of them, and if followed properly life can be much simpler than if lumping everything under one policyset and…

+ read more

By: ab
Jul 2, 2015
8:15 am
Reads:
2,038
Score:
5

“You better start swimming or you’ll sink like a stone for the times they are a-changin’,” Bob Dylan famously sang in 1964. “The Times They Are a-Changin’,” has become one of Dylan’s most recognized and well-loved songs. In fact, Steve Jobs recited the second verse of the song during the 1984 annual Apple shareholder meeting…

+ read more

GeoffWebb
By: GeoffWebb
Jun 25, 2015
7:36 am
Reads:
2,447
Score:
Unrated

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
2,489
Score:
5

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
2,476
Score:
5

NetIQ Identity Manager has followed an interesting evolutionary path over time. It started as a simple object and attribute synchronization engine with DirXML 1.0 and more features have been added over time. One of the more interesting enhancements has been the addition of the Roles Based Provisioning Module (RBPM) which is really several things all…

+ read more

geoffc
By: geoffc
Feb 14, 2014
11:48 am
Reads:
3,057
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow