It's OK, the Use of 2.0 Seems Very Legit in This Context
"Enterprises continue to expand the use of cloud computing, and particularly software-as-a-service applications (SaaS), to achieve operational performance enhancements and efficiencies. Implementation of these technologies introduces several challenges related to identity management, such as administration and delegation of account authentication and authorization. A new approach to identity is required to ensure the continued growth and success of cloud computing: we call this Identity 2.0."
So it seems to me there's a legitimate use of the "2.0" thingie with this description, which comes from Cloud Expo session abstract on the topic of identity management within Cloud Computing architectures. The session will be presented by Fran Rosch, Senior VP of Authentication Product Management at Verisign.
He elaborates as follows: "One of the most critical challenges is the need to accurately identify and manage users of these services. Yet at the same time, users are demanding greater control, convenience, and security."
"The challenges faced by a greater emphasis on the cloud are ones of both centralization and de-centralization: the centralization of computing resources combined with the decentralization of identity, authentication and authorization. Identity 2.0's challenge is how to cope with these two competing forces while avoiding the pitfalls of the past. Is Identity 2.0, therefore, prepared for an explosion of cloud computing, or do we need some other model?"
This is the kind of serious hashing out of issues that is ongoing with Enterprise Cloud Computing.
Join Us: http://bit.ly/joincloud
Monday, 22 March 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment