|We are headed into a phase in Identity Management that is heavily driven by compliance and security, corresponding to a strong demand for intelligent role management and compliance reporting to automate and simplify these processes for enterprises.
Jutta Cymanek as quoted in Omada Appoints RBAC Specialist to Identity Management Team
|Just a year ago, OpenID was more the hobby of a few fanboys than a serious challenge to the way identities are stored and managed. But in January, Yahoo! announced that all 250 million of its user accounts would become OpenID identifiers, thereby tripling the number of OpenID accounts overnight.
Chris Makarsky, I’ll need to see some ID
|Science has a simple faith which transcends utility. It is the faith that it is the privilege of man to learn to understand, and that this is his mission.
Bush, FDR’s Science Officer, is generally credited with changing the way scientific research in the U.S. gets funded. His work to create a relationship between the government and the scientific establishment during WWII fostered the environment in which the Internet was born.
Ever wonder what Mr. T is up to? He's doing video spots for Hitachi Data System Virtualization. [kml_flashembed movie="http://youtube.com/v/tW1S2tsxVHg" width="425" height="350" wmode="transparent" /]
[kml_flashembed movie="http://youtube.com/v/n2ylBKOURtw" width="425" height="350" wmode="transparent" /]
Steven Zelin, the Singing CPA, sings a rather clever rendition of "Happy Birthday" to Sarbanes-Oxley.
I’m not plugging Serena Dimensions. I am plugging their video — they did a nice job explaining some of the issues surrounding change management.
| Counterfeit network hardware entering the marketplace raises significant public safety concerns and must be stopped…It is critically important that network administrators in both private sector and government perform due diligence in order to prevent counterfeit hardware from being installed on their networks.
Assistant Attorney General Alice S. Fisher, as quoted in Progress Reported Against Traffickers in Counterfeit Network Hardware
Over the last 2 years, Operation Cisco Raider has resulted in 36 search warrants that identified approximately 3,500 counterfeit network components with an estimated retail value of over $3.5 million, and has led to a total of ten convictions and $1.7 million in restitution.
|I was watching CSI: New York last night and spotted two MS Roundtable devices on a conference table. Props to the UC guys for the product placement, Roundtables after all are very cool desktop video conferencing devices but maybe someone should tell the CSI chaps they only need to have one in the room.|
[kml_flashembed movie="http://youtube.com/v/cvd7-_UtZ70" width="425" height="350" wmode="transparent" /]
This video is making the rounds. Nobody seems to know if it’s staged or real. Either way, I can picture it happening. The only surprising thing to me is that anyone at the meeting was paying attention enough to notice. Although on second thought, I can remember watching someone spend an entire meeting twirling in his chair. He thought he was dark — and we were so entertained and suprised by his twirling that we didn’t let him know we could see him.
|The validation consultant’s role could be to develop requirements documents and a compliance validation plan for the client. We’d also arrange for user training, coordinate the installation and testing of the system, and write a validation summary report when the testing is complete. It’s an extremely formalized process for “kicking the tires.”
Mikie McGinnes, QA Edge Inc.
I had an interesting email exchange with Mikie McGinnes this week (pictured with her dog Chloe). She has an IT-related job I didn’t even know existed. Mikie is a validation consultant. And she loves her job!
Sometimes when you work in IT, it’s tough to explain to outsiders what exactly it is that you do for a living. Well, Mikie’s the one you call when your company needs to figure out how to prove it’s being compliant.
We need to add a definition for compliance validation to WhatIs.com. Mikie said:
When regulated industries install or change any equipment that impacts the identity, strength, or quality of their products, their regulatory agency requires that the company collect documented evidence to show that the equipment or process is operating as intended, that it produces the expected results (or product), and that the equipment or process will continue to operate as intended in the future. This “collection of documented evidence” is the validation.