Gotcha

Lunch!Gotcha

MS Goes Open Source to Boost Identity Management

I’m not sure what this means yet. I will call Kim and find out.I think it is a good idea, but under what license agreement. Certainly not the GPL! 

Microsoft is launching a slew of initiatives to help Web sites identify visitors.
First, the company is kicking off four open-source projects to support the development of ID cards for online users. Microsoft is also releasing one of its identity management specs, Identity Selector Interoperability Profile, under its OSP (Open Specification Promise), meaning the specification is clear of licensing fees or patent worries.

Sponsored Links (Ads by Google)

Identity Mgmt SolutionsVisit idAlliance for Identity Provisioning and Security Answers
www.idalliance.net

Identity ManagementWhite Papers: Best Practices, Compliance, more.
www.FischerInternational.com

Standardize and IntegrateManage your K-12 enterprise with SIF automation tools from CPSI.
www.vcasel.com

Finally, Microsoft is responding to users’ requests for better direct synchronization of identity information between Active Directory and the OpenLDAP Directory using Microsoft ILM (Identity Lifecycle Manager) 2007 by collaborating on an open-source project with Kernel Networks and Oxford Computer Group to create an OpenLDAP adapter for Microsoft ILM 2007.

Source: MS Goes Open Source to Boost Identity Management

 

Technorati tags: , ,

12 Important U.S. Laws Every Blogger Needs to Know

 OK. It’s a little late but you should know I read this and you should read it too.

12 Important U.S. Laws Every Blogger Needs to Know

May 1st, 2007

While the Internet still retains some of the “wild wild west” feel, increasingly Internet activity, and particular blogging, is being shaped and governed by state and federal laws. For US bloggers in particular, blogging has become a veritable land mine of potential legal issues, and the situation isn’t helped by the fact that the law in this area is constantly in flux. In this article we highlight twelve of the most important US laws when it comes to blogging and provide some simple and straightforward tips for safely navigating them.

Source: Blog Law » 12 Important U.S. Laws Every Blogger Needs to Know

Phil Windley– "I’ve Got Fiber to My House"

 Man am I jealous. 40 bucks a month for 12MB/sec. Sweet!

Utopia truck ready for
install

Utopia truck ready for install
(click to enlarge)

Utopia is Utah’s large-scale municipal-broadband project. My city, Lindon, was one of the first supporters of the project and all winter I’ve watched in anticipation as crews dug up the lawns in my neighborhood laying fiber.

I first heard about Utopia when I was Utah’s CIO and Utopia was just a dream Paul Morris had. I’ve supported it, written about it, testified about it to city councils, and, mostly, waited for it. Yesterday was the day that I had service installed in my house.

Source: Phil Windley’s Technometria | I’ve Got Fiber to My House

 

Technorati tags: , ,

Things Computers Can Do in Movies

 My wife hates it when I point these little details out in a movie. Face it, computer use in movies is only enabled by a strong dose of suspension of disbelief.

Writing by admin on Sunday, 8 of April , 2007 at 6:47 am

1. Word processors never display a cursor.
2. You never have to use the space-bar when typing long sentences.
3. Movie characters never make typing mistakes.
4. All monitors display inch-high letters.
5. High-tech computers, such as those used by NASA, the CIA or some such governmental institution, will have easy to understand graphical interfaces.
6. Those that don’t have graphical interfaces will have incredibly powerful text-based command shells that can correctly understand and execute commands typed in plain English.
7. Note: Command line interfaces will give you access to any information you want by simply typing, “ACCESS THE SECRET FILES” on any near-by keyboard.
8. You can also infect a computer with a destructive virus by simply typing “UPLOAD VIRUS”. (See “Fortress”.)
9. All computers are connected. You can access the information on the villain’s desktop computer even if it’s turned off.
10. Powerful computers beep whenever you press a key or the screen changes. Some computers also slow down the output on the screen so that it doesn’t go faster than you can read. (Really advanced computers will also emulate the sound of a dot-matrix printer.)
11. All computer panels operate on thousands of volts and have explosive devices underneath their surface. Malfunctions are indicated by a bright flash of light, a puff of smoke, a shower of sparks and an explosion that causes you to jump backwards.
12. People typing on a computer can safely turn it off without saving the data.
13. A hacker is always able to break into the most sensitive computer in the world by guessing the secret password in two tries.
14. You may bypass “PERMISSION DENIED” message by using the “OVERRIDE” function. (See “Demolition Man”.)
15. Computers only take 2 seconds to boot up instead of the average minutes for desktop PCs and 30 minutes or more for larger systems that can run 24 hours, 365 days a year without a reset.
16. Complex calculations and loading of huge amounts of data will be accomplished in under three seconds. Movie modems usually appear to transmit data at the speed of two gigabytes per second.
17. When the power plant/missile site/main computer overheats, all control panels will explode shortly before the entire building will.
18. If you display a file on the screen and someone deletes the file, it also disappears from the screen (See “Clear and Present Danger”).
19. If a disk contains encrypted files, you are automatically asked for a password when you insert it.
20. Computers can interface with any other computer regardless of the manufacturer or galaxy where it originated. (See “Independence Day”.)
21. Computer disks will work on any computer has a floppy drive and all software is usable on any platforms.
22. The more high-tech the equipment, the more buttons it will have (See “Aliens”.)
23. Note: You must be highly trained to operate high-tech computers because the buttons have no labels except for the “SELF-DESTRUCT” button.
24. Most computers, no matter how small, have reality-defying three-dimensional active animation, photo-realistic graphics capabilities.
25. Laptops always have amazing real-time video phone capabilities and performance similar to a CRAY Supercomputer.
26. Whenever a character looks at a monitor, the image is so bright that it projects itself onto their face. (See “Alien” or “2001″)
27. Searches on the internet will always return what you are looking for no matter how vague your keywords are. (See “Mission Impossible”, Tom Cruise searches with keywords like “file” and “computer” and 3 results are returned.)

Source: Programming Blog – Problems & Solutions, Tips & Tricks » Things Computers Can Do in Movies

MobileCrunch » Cellblock: Fast Video and Image Vlogging

Gotta try it!

cb 

Kim Cameron’s Identity Weblog » If they don’t scan, they don’t eat

Kim is posting a series of articles about biometrics and biometrics usage in schools. Very scary stuff. 

Posted on Thursday 29 March 2007

The more I look into this story, the worse it gets.  We don’t have to go to Britain for examples of child fingerprinting – just take a look at this email from a lady in Illinois:

Kim,

My name is Joy and I am continuing to get the word out & tell this true story.

In August 2005, our public school district with less than 500 students decided to start using biometric equipment for “accounting purposes”.  We were told at registration to take our children over and have them scanned.  (There was not an opt out or opt in policy).

I objected and said no – our children are not to use this equipment -especially when there is not a policy to look over.

We were told, “if they don’t scan ,they don’t eat.”

I explained I believed that to against the law and the rights of the children as well as parental rights.  I was then told that this equipment would put Earlville, Illinois on the map (not like they thought).  A few days later I gave birth to our youngest daughter, on Aug 20, 2005, and explained to my husband that when I recovered I was going to discuss this matter with the district administration again.

Meanwhile my eldest children Brooke & Gunner were still brown bagging it.  Well, Sept 21, 2005 my 7 year old son was scanned anyway – even though he reminded the “tech director” that he was not to scan.

I of course called the school and started recieving excuses from the adminstrative staff.  I went to the local paper, the school board and still did not feel as if we were getting very far with our objection.  I then decided to write to Illinois legislators and the media.

Senator Miquel Del Valle introduced SB 2549 in Jan, 2006. CBN came to our town and interviewed us (as well as Senator Miquel Del Valle on a different date.)  The story aired Nov 7, 2006.  Then Senator Miguel Del Valle stepped down and took another position in Chicago. SB 2549-session sine die.

There I was again writing and calling the media and legislators.  In Jan,  2007 I was invited to speak with some privacy advocates and share this almost unbelievable story.  In Feb, 2007 two bills were introduced and are passing:  HB 1559,  introduced by State Rep Bob Pritchard; and SB 1702, introduced by Senator Kim Lightford.

I have several newspaper articles as well as letters from the Superintendant stating that my 7 yearr old son willingly gave up his finger.  Info about this story can also be found on EFFs deeplinks ,the Cato Institute,The End times and of course the CBN website.   As soon as I get updated on the bills I can notify you.   In the meantime I will continue to get the word out and search for advice on this matter .

I had my finger impression scanned for an Illinois licensure requirement, however I am a mother of five, over 30 and a private detective.

Not a minor child trying to by hot lunch at school.  We know that the data on these children can be sold, given away and anyone who knows how to write a FOIA can have access to this info. 

Joy Robinson-Van Gilder

Source: Kim Cameron’s Identity Weblog » If they don’t scan, they don’t eat