Phil and myself just got back from our walk through at the Josaphine Butler Parks Center where IIW-East opens tomorrow. He shot some photos of it (outside) (inside)
We are doing our first Internet Identity Workshop outside of the Bay Area and our first with a theme – Open Identity for Open Governmnet.
We have over 75 people attending from around the world – you can see the names at the bottom of the registration page.
The proposed topics shared so far as attendees register can be seen here on the wiki. They are amazingly diverse and center around key issues about policy, standards, legal frameworks and the path forward for those who care about creating an identity layer/infrastructure/platform that really works for people.
The actual agenda will be created tomorrow morning at 10 am following an introductory talk by Kaliya Young Hamlin and Mary Rudy at 9am. We will make the agenda for Friday at 9am that day.
Personally I am passionate about the conversations that will be happening about personal data stores and their evolution.
Annoucements of Events
Privacy Identity and Innovation – pii & Women
The Privacy Identity and Innovation is coming up August 17-19th in Seattle, Washington.
This conference is the brain child of Natalie Fonseca who has run the Tech Policy Summit for several years.
I am speaking at the event on a panel about personal data stores (a new project I will write more about here soon). I am really proud to be amongst many other women industry leaders speaking. I know Natalie took proactive approach to recruiting women to speak and voila – their are women speakers at this technology conference.
Denise Tayloe, CEO of Privo
Marie Alexander, CEO of Quova
Linda Criddle, CEO of Reputation Share
Fran Maier, President of TRUSTe
Anne Toth, Chief Privacy Officer for Yahoo
Michelle Dennedy, VP at Oracle
Judith Spencer of GSA
Christine Lemke, CTO of Sense Networks
Betsy Masiello of Google
Heather West of Center for Democracy and Technology
Eve Maler of PayPal
Susan Lyon of Perkins Coie
Deborah Estrin of UCLA
It should be a great event – the guys on the program are equally cool.
Internet Identity Workshop in DC
The Internet Identity Workshop is coming to the east coast for the first time – September 9-10, 2010 in Washington DC.
The theme for the event is Open Identity for Open Government. You can learn more about the event on the IIW website and register over on this site.
Internet Identity Workshop comes to DC!
Theme: Open Identity for Open Government.
Register Here!
Internet Identity Workshop East (IIW-East) is September 9-10, 2010 in Washington DC at the Josaphine Buttler Parks Center. This event immediately follows the Gov 2.0 Summit.
The Internet Identity Workshop has been held semi-annually in California since the Fall of 2005. The 10th IIW was held this past May and had the largest attendance thus far. There have been many requests to have an IIW on the East coast, and now the Open Identity for Open Government Initiative is providing a timely incentive to have one in Washington.
IIWs focus is on “user-centric identity”, addressing the technical and adoption challenge of how people can manage their own identity across the range of websites, services, companies, government agencies and organizations with which they interact. IIW-East will focus mainly on the government adoption of open identity technologies for use by government websites.
- OpenID
- IMI Information Cards
- GSA approved schemas for open identity protocols
- Personal Data Stores
- NIH pilot adoption of Open Identity technologies
- Certification of industry open identity credentials
- Business models for higher LOA open identity credentials
- National Strategy for Trusted Identities in Cyberspace
The event has a unique format – the agenda is created live the day of the event. This allows for the discussion of key issues, projects and a lot of interactive opportunities with key industry leaders.
The event compiles a book of proceedings with the notes that are gathered from the conference. You can find the Book of Proceedings for IIW7, IIW8, IIW9 & IIW10 here. BTW these FOUR documents are your key to convincing your employer that this event will be valuable. As attendees register we ask about topics they wish to discuss.
Providing identity services between the general public and government websites is a different problem than providing authentication and authorization services within one or a few organizations (enterprise provisioning/termination or federation between two companies or government agencies).
As a community we are exploring these kinds of issues:
Questions Agencies Face:
- How can open identity technologies enable open government
- How can agencies leverage identity credentials generated by other organizations
- How can the government leverage the efforts of social networking sites that offer user-centric identity credentials
- What are the advantages to agencies of adopting open identity technologies
- How can open identity technologies enable your websites to move beyond brochure-ware
- How can we increase the speed in which government organizations can benefit from the use of open identity approaches
- How to manage Federated Identity on an ever increasing scale
- What are the implications of National Strategy for existing policy mandates
- Should there be integrated political architecture
- There are five distinct Cyber Security Bills in Congress now – what are the implications
Policy Considerations:
- The relationship between FIPS (Federal Information Processing Standards) and identity management
- What are the business cases for agencies to adopt Open Identity Technologies
- What are the new legal constructs that make this work
- How to use open identity technologies to preserve privacy while providing personalization
- GSA standards for the use of open identity technology
- Data Privacy Issues
- Personal Data – how is it stored and shared with end users
- How are these new approaches regulated
Technical Issues:
- Open identity standards (identity and semantic)
- What software is available to leverage open identity standards
- How different standards and technical implementations interoperate
- How agencies can accept identity credentials generated by other organizations
- How open identity technologies can enable your website to move beyond brochure ware, without using cookies
- How to leverage open identity technologies in your technology roadmap
- How to implement Federal Identity
- Tecnlogy issues involved in implementing existing Identity Management technology
- Lessons learned – what are the most effective ways for Federal Agencies to build and employ identity systems
New Industry Developments:
- Personal Data Stores/Data Banks with our digital footprints recorded
- What new Identity Management technologies are on the horizon
- National strategy for trusted identities in Cyberspace
Please join us at the Internet Identity Workshop
To consider all these and more!
It is the best place to meet and participate with all the key people and projects such as:
- OpenID
- IMI Information Cards
- GSA approved schemas for open identity protocols
- Personal Data Stores
- NIH pilot adoption of Open Identity technologies
- Certification of industry open identity credentials
- Business models for higher LOA open identity credentials
- National Strategy for Trusted Identities in Cyberspace
IIW Date Shift – May 17-19
It turns out Google I/O is the week of IIW. We found out too late to shift weeks but early enough to shift days to only conflict 1 day (the 19th). Please mark your calendars accordingly.
Early Bird Registration is in effect for another month. Sponsorships and “big tickets” (for those who can expense a higher ticket price but can’t get actual “sponsorship budget”) are still available.
ID-Legal – Mapping the Gap – Bridging Commumities
Next month we are hosting a gathering called Map the Gaps. It came out of a session I ran several IIW’s ago asking the question what if there was a “Legal-IIW” the intent was always to cross communities and connect activities already in this area. The intent from the beginning was to connect with and work with PPEG at Liberty Alliance. I am happy to be working with Robin from Kantara who ran the PPEG group at Liberty Alliance. Lucy from the Internet Society has been a real champion of the event.
We are threading the needle of size and accessability. Our intent is to make as much as possible about the conversation public and report out. We also know that the energy is really different with 20-30 people vs. 100. We are seeking interest particularly from technologist who are interested in understanding how Lawyers think and how different aspects of law are going to end up impacting the technologies they build and how those technologies will change the law.
You can see the matrices we are looking to fill in here on the ID-Commons wiki.
Here is the invitation and this is a link to express interest in attending.
Identity Commons and The Kantara Initiative
present an identity workshop and symposium to
“Map the Gaps”
Sponsored by the Internet Society.
March 18th-19th, 2010, Washington DC
The event will be attended by representatives of the diverse identity communities to help “Map the Gaps” that currently exist between the policy/legal and technology views of digital identity and online privacy.
The intention of the “mapping” exercise is to benefit the overall identity community by cataloguing and examining the characteristics and approaches of various online identity-related technical and legal initiatives, so that they can be applied to find common ground to integrate the research and development initiatives in the identity space.
The infrastructure for online identity continues to evolve, and increasingly raises social and privacy questions which are large, complex, and cannot be solved either by technology alone, or by a “single-stakeholder” approach.
While technologists and lawyers have worked separately in the past, identity technologies are now bringing people together in ways that are so intimate and far-reaching that they change both the way humans relate to technology, and the technologically-mediated ways humans relate to each other. Many of those technologically-mediated interactions are the subject of various established laws, which must now be reviewed in the light of this evolution: the technology cannot properly develop without legal guidance and vice versa.
This effort will depend upon the identification and creation of common concepts, language and paradigms to guide future development in the area. Our aim is to bring technologists and legal and policy professionals together, establish a common understanding of each other’s domains, and map out the gaps which subsequent work would aim to bridge.
The “Map the Gaps” event will provide participants with a forum to contribute various perspectives on identity-related themes, the output of which may be coordinated with American Bar Association events as well as within working groups at ID Commons and the Kantara Initiative.
Due to limited space, the event is being held by invitation only. There are, however, other ways to participate in this important work, including submitting written materials for inclusion in symposium online materials.
In order to assure that the broadest possible representation of interests is achieved to inform the work that will take place at the symposium, all submitted papers will be made available to attendees and others on the Identity Commons and Kantara symposium-related websites.
Limited spaces have been reserved at the symposium for a few additional invitations to be extended to individuals and institutional representatives based on a review of submitted papers. Additional invitations may be extended based on those papers that offer significant perspectives and insights that are perceived to be different than or complementary to those already represented by the existing symposium attendees.
Next steps:
The symposium will be interactive and participant-driven: we ask all persons who would like to attend the meeting as participants to contribute, in advance (and no later than February 28, 2010), a brief (250-500 words) position paper, analysis or other description of an interesting or pressing problem they have encountered in this field. Papers will be posted as noted above, and we will extend invitations for participation to the authors of those papers that satisfy the criteria indicated above.
To express interest in the “Map the Gaps” workshop and symposium:
https://www.isoc.org/isoc/conferences/registration/?id=19
Event Committee:
- Scott David, K&L Gates LLC.
- Lucy Lynch, Internet Society
- Kaliya Hamlin, ID Commons
- J. Trent Adams, Internet Society
- Robin Wilton, Future Identity, Ltd.
IIW9 Highlights – IIW10 Reg Open
I am really pleased to share that the notes for IIW9 are available in PDF form now. All sessions also have a wiki page too.
Heidi Nobantu Saul did an amazing job collecting notes and we managed to get all session notes except a very few on the last day.
Highlights include:
- The session on Active Clients that went for several hours on Wednesday that was preceded by the presentation of an OpenID Selector by MSFT on Tuesday and followed by What should Identity Support in the browser look like? led by Johannes Ernst.
- The Conversation about Social Consent
- Action Cards continuing to develop with Kynetx & Joe Andrieu presented on Portable Contexts.
- Progress made on moving activity streams forward.
- The OAuth-WRAP conversations which are continuing. Facebook also led a session on why they don’t support today’s OAuth.
- The continued evolution of WebFinger, XRD, LRDD & what is becoming know as the Hammer-Stack
- Salmon-Protocol to support comments “swimming upstream”
- The Trust Framework activity with OpenID Foundation, Information Card Foundation and the Federal Government.
The 10th Internet Identity Workshop is May 18-20.
Registration is Open Now and Extra Early Bird Rates are in effect until January 31.
Internet Identity Workshop Details + Regular Registration Ends Wednesday
This is cross posted on the IIW Blog
Regular Registration ENDS NEXT WEDNESDAY – October 28th at Midnight. Prices go up $100 after that.
The Internet Identity Workshop #9 Tuesday – Thursday, November 3-5 in Mountain View, CA Computer History Museum
Please blog/tweet about the conference. The hash tag is #iiw , our twitter handle is @idworkshop
Proposed Topics List is here. We all make the agenda together beginning at 1 on Tuesday and again on Wednesday and Thursday morning. If you want to know more about how to prepare for an unconference check out this piece called “unconferencing” by Kaliya Hamlin (@identitywoman) the facilitator of the workshop.
You can see the specific times of sessions.
Tuesday Morning Opening talks will cover: * The Identity Trust Framework activities – Drummond Reed and Don Thibeau * Data Portability releasing their EULA work * Action Cards – Phil Windley and Paul Trevithick * Discovery etc. – Eran Hammer-Lahav * Activity Strea.ms etc. – * A VRM update * We might cover activity happening in the healthcare sector * We are working on having Vivek Kundra the CIO of the US join us via skype – as yet this is unconfirmed.
They won’t cover – OpenID 101, Information Cards 101 or SAML 101 If you are unfamiliar with these topics we recommend reading these papers/watching these videos. There is a lot of information online covering these topics on the foundations/organizations respective websites.
OpenID – http://openid.net/ OpenID video about it – http://www.youtube.com/
Information Cards – http://informationcard.net/ Video – http://informationcard.net/watch-the-video
SAML – http://en.wikipedia.org/wiki/SecurityAssertionMarkup_Language Video – Ping Identity on SAML 101
All together now – the Venn of Identity The paper – by Drummond and Eve the update – The Zen of Venn
Demo Hour: We still have Demonstration slots available you must sign up ahead of time to Demo. It is Wednesday after lunch short 5min demos will be happening throughout the hour – throughout the room. Please e-mail Kaliya[at]mac.com to get a table and more information about how it will work.
Food: I forgot to ask if there were any special dietary requirements. Please let me know if you have any – this is what we have in store for you.
Tuesday – Burrito Bar, Tied House Wednesday – Indian, Italian Thursday – BBQ Boys
Thank you to our Sponsors:
Without their contributions this conference would not be possible. (we still have sponsorship opportunities available)
<a href=”http://www.internetidentityworkshop.com/sponsors/”> <img src=”http://www.internetidentityworkshop.com/wp-content/uploads/2009/10/IIW9Sidebar.jpg”> </a>
About the Notes Taking Procedures: In our effort to document the whole confernece and give all attendees access to all the happenings in sessions we have a notes taking procedure:
If you convene a session it is your responsibility to get a note taker for your session.
The note taker needs to use the NOTE TAKING FORM – found here in digital form (the paper version will be avaliable in each break out space too). When notes are complete, the note taking form must be e-mailed to iiwnotes@gmail.com OR transfered to a USB key at Documentation Center OR if paper notes are taken transcribed by the notes taker on computers provided in Documentation Center
We will also be collecting a more immediate list of results from each session on 11×17 sheets.
We are looking forward to seeing you next Tuesday!
let us know if you have any other questions,
-Kaliya, Phil and Doc
ReadWrite Real-Time Web Summit Announced
The ReadWrite Real-Time Web Summit announcement is live. I am working on this with them as the facilitator. The event is modeled on the format we use at the Internet Identity Workshop to get a lot done and have real discussions about emerging topics in industry.
ReadWriteWeb has offered high quality coverage of this area for a long time and they seem like a natural convener of real conversation. Of course Identity is key to this industry but so are many other things.
IIW IX is open for business
Internet Identity Workshop number 9 is coming up in about 10 weeks. November 3-5 (Tuesday to Thursday) in Mountain View California at the Computer History Museum.
We are excited about all the developments in the industry with protocol evolution in the social web space AND larger and larger scale deployments of open identity technologies including OpenID and Information Cards.
There will be much to talk about at this fall’s event.
Early REGISTRATION is Open! UNTIL SEPTEMBER 16 then prices go up by $50-75
Early Bird Prices are….
- $274 regular tickets
- $148 for independents
- $ 50 for students
We need to get 75 people registered by September 16 to make a final confirmation for our conference space at the Computer History Museum.
Special this year we have the “BIG” ticket for those can expense $998 (but can’t convince marketing to sponsor). This is a GREAT way to support IIW!
IIW is a completely community driven event – we don’t pay anyone for marketing – the community is our marketing.
Please put our LOGO ON our blog our WEBSITE.
Follow IIW on Twitter – @idworkshop
SPONSORSHIP OPPORTUNITIES ARE STILL AVAILABLE!!! Please contact Phil if you are interested in learning more phil@windley.org
JOIN THE COMMUNITY MAILING LIST
THE INVITATION TO IIW!
The Internet Identity Workshop focuses on “user-centric identity” and netizen empowerment on the social web trying to solve the technical challenge of how people can manage their own identity and social activity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with.
This is where everyone from a diverse range of projects doing the real-work of making this vision happen gather and work intensively for three days. It is the best place to meet and participate with all the key people and projects. This is a comprehensive list of the technology communities that are covered.
The event does not have a pre-set agenda instead as people register they are asked what they would like to present about, learn and discuss with peers/industry experts. These are all collected here . The first morning of the conference will be introductory orientation about key projects and technologies in the community. After that the community creates the agenda itself using the Open Space Method. Dinner both Tuesday and Wednesday are a big part of the conference.
Here are links to notes that cover most of the sessions from the last two conferences IIW #8 spring of 2009 IIW #7 fall of 2008
These documents are great resources for convincing your boss of the value of this event.
The heart of the workshop is a practical idealism in working towards the shared vision of a decentralized, user-oriented identity layer for the Internet.
Because the web was built around “pages”, no tools or standards were created to control how the information about you was collected or used. At the Internet Identity Workshop we bring the people creating these tools and standards so people can safely manage their online identity and control their personal data.
It is not about any one technology – rather it is a place to discuss multiple interoperating (and possible competing) projects, standards, and networks for identity, data sharing, and reputation.
As part of Identity Commons, the Internet Identity Workshop creates opportunities for both innovators and competitors. We provide an open forum for both the big guys and the small fry to come together in a safe and balanced space.
There are a wide range of projects in the community:
- Open conceptual, community, and governance models.
- Open standards and protocols.
- Open source projects.
- Commercial projects.
- Projects to address social and legal implications of these technologies.
- Efforts to rethink the business models and opportunities available with these new technologies.
User-centric identity is the ability:
- To use one’s identifier(s) on more than one site
- To control who sees what information about you
- To selectively share presence and profile information
- To maintain multiple identities and personas in the contexts you wish
- To aggregate attention, navigation, and purchase history from the sites and communities you frequent
- To move and share your personal data, relationships, documents, and other publications as you wish
All of the following are active topic areas at each IIW:
- Improving Existing Legal Constructs Privacy Policies Terms of Service
- Creating New Legal Constructs – Limited Liability Personas, Identity Rights Agreements
- Creating New Business Models – Identity Oracle, I-Brokers
- New Citizenship Perspectives – Activism Community, Event Coordination, Community Identity and Data Sharing
The Internet Identity Workshop (IIW) was founded in the fall of 2005 by Phil Windley, Doc Searls and Kaliya Hamlin. IIW is a working group of Identity Commons The event has been a leading space of innovation and collaboration amongst the diverse community working on user-centric identity.
its that SXSW picking time of year
This year there are 2200 panels submitted for 300 slots. It is great they are going with community generated ideas for the conference. It is also hard to tell what will be happening in our fast moving industry 7 months from now. PLEASE go to SXSW create an account and then vote for these two 🙂
I put a lot of thought in to what to put forward this year knowing it would be 9 months out. One of the trends that is just starting to emerge is identity verification – my hunch is that by March this will be a topic getting a lot of attention and worth exploring at SXSW.
Who are you? Identity trends on the Social Web.
“On the Internet Nobody Knows You’re a Dog” Is this famous New Yorker cartoon still true? Twitter is doing verified accounts. Facebook claims everyone using their “real name” gives strong social validation ‘proof’. Equifax is validating age with information cards (digital tokens). We will explore the current trends and their implications for the future.
- What is identity?
- Why are people doing identity validation?
- Who is doing identity validation?
- Why are websites seeking people who have had their identities validated?
- Is identity validation improving the web?
- What are the current open standards in this space?
- Are approaches by men and women different about idnetity presentation and validation?
- What kinds of businesses are requiring online identity validation for customers?
- Is identity validation going to squish “free speech”?
- How is this trend changing the web?
With my She’s Geeky hat on: What Guys are Doing to Get More Girls in Tech!
The point of this is to get beyond the women say there are issues in the field and guys say there isn’t – to have guys who know there is an issue and are proactively doing constructive stuff to address it.
Many tech fields have a low percentage of women. If you are a guy do you wonder what you can do about it? Learn about successful strategies and proactive approaches for supporting women you work with and participate in community with. We will even cover some well-intentioned efforts that have gone awry.
- How many women by percentage participate in different technical fields?
- Why does it matter that they are underrepresented in these fields?
- What are the cultural norms that men and women have about performance and self-promotion?
- What is Male Programmer Privilege?
- What can a guy do who has a sister that is math/science inclined but being steered away from the field?
- How have the men on the panel improved things in their workplaces?
- How have the men on the panel addressed the challenges that arise in open communities? (that is where you don’t have a boss that fires people for inappropriate behavior/comments)
- What are the qualities of a workplace that is friendly for women?
- How to go beyond tokenism in workplaces, communities and conferences?
- How to encourage women more?
Other interesting Preso/panels covering Identity topics:
The Politics & Economics of Identity Put forward by my friend Liza Sabature of Culture Kitchen and the Daily Gotham Identity Politics” has always been left to the realm of feminist, civil rights activists, aka “minority politics”. This panel will explore the social and political ramifications of the business of identity and reputation. We will talk about the good, the bad and the ugly and what social entrepreneurs, businesses and digital activists are doing to impact this new economy.
- What is identity?
- What is reputation?
- What is privacy?
- How have big business historical monetized privacy?
- How social media works on identity and reputation?
- Online surveillance in the US : DMCA, FISA, Patriot Act
- Facebook BEACON : a study on how not to spy on people for fun and profit
- Google Adsense or Spysense?
- What are Vendor-Relationship Management systems?
- Will we need “Identity Management Systems” instead of VRMs?
Distributed Identity: API’s of the Semantic Web Without much conscious thought, most of us have built identities across the web. We fill in profiles, upload photos, videos, reviews and bookmarks. This session will explore the practical use of Social Graph API and YQL to build new types of user experience combining identity discovery and data portability.
Online Gatekeeping: Who Died and Made You King? by Liz Burr As the web becomes more open via social networks, we’re adopting new rules of communication. But who creates these rules? How much does class, race and gender figure into social media policing? We’ll discuss how identity affects social networks, as well as look at how online communities police themselves as participation expands.
- Which groups are in control of what is worth sharing via social media?
- Are the under-25 community using social media differently?
- How do we recognize and confront social media ‘gatekeepers’?
- Is our behavior in online communities merely a reflection of offline stereotypes and experiences?
- What is the impact of the amplification of social stereotypes online on under-represented groups?
- How do we integrate previously, under-represented groups into this more social world?
- Is there really such a thing as a “digital ghetto”? If so, is it our responsiblity to combat it?
OpenID: Identity is the platform is put forward by Chis Messina.
I have to say it is really great to have this be put forward so plainly and simply – to “get religion” about user-centric tdentity and its central role in shaping the fugure the social web.
Ignore the hype over social networking platforms and web OS’s! The platform of the social web is identity. Facebook and Twitter Connect are just the beginning of the era of user-centric identity. I’ll go beyond the basics of OpenID and learn how to effectively incorporate internet identity into your apps.
Your Online Identity After Death and Digital Wills
If you died tomorrow, would someone take care of your internet accounts? How do you tell subscribers the blogger has died? Every day people die and no one can access their email. Let’s explore what can be done to manage your online identity after you pass on.
- What usually happens to email accounts when a person dies? Policies for Gmail, Yahoo, Hotmail and AOL
- What about WordPress.com and Blogger for digital policies concerning the death of a blogger?
- Do You have a digital will setup?
- Products and services to manage digital wills, electronic correspondence after death and auto replies.
- Grief, “You Have Mail” and online memorial services.
- Who owns blog content after the death of a blogger?
- How to calculate the worth of your website or blog.
- How can you manage your online accounts and passwords for easy access after you pass?
- What are some recent legal examples of online account ownership disagreements?
- How to keep your passwords safe?
How to Benefit from 1-Click Identity Providers by Luke Shepard from Facebook.
Sites across the Web are opening up to support open identity platforms, such as OpenID. How can companies at scale and those with large user bases successfully work with open standards including OpenID, Activity Streams and new social markup language specs? Can companies survive the challenges of incorporating OpenID into their websites?
- Are there any success stories with OpenID?
- What does the OpenID user experience look like?
- Who has implemented OpenID?
- What have been some of the failures of OpenID?
- What is OpenID?
- What are the user benefits of OpenID?
- How can websites educate users about open protocols?
- What are the privacy concerns around OpenID?
- What kind of user data is made available to sites when they implement OpenID?
- What will it take for OpenID to become mainstream?
Crime Scene: Digital Identity Theft
Identity & Gov and & Open Standards
I am really happy to let you all know about this forth coming OASIS ID-Trust Identity Management 2009 event September 29-30.
The theme of the event will be “Transparent Government: Risk, Rewards, and Repercussions.”
The U.S. National Institute of Standards and Technology (NIST) will be hosting it in Gainthersburg, Maryland.
In the why attend the reference part of a directive by Barack Obama to the National Security Council and Homeland Security Council.
“to defend our information and communications infrastructure, strengthen public/private partnerships, invest in cutting edge research and development and to begin a national campaign to promote cyber-security awareness and digital literacy.” The U.S. federal government aims to accomplish all of this while becoming increasingly open and transparent.
The program is now available – and looks quite good.
There is a discount available until August 31. There are special registration proceedures for non-US citizens.
London this week
Things are coming together for heading to London – I can’t believe I leave tomorrow. The plan is to get up early tomorrow and then sleep on the plane. I have found accommodations for the whole time. I will be in Oxford from the 2-6 and then in london from the 6-11.
The schedule has got a bit more detail in it – if you want to edit it ping me and I can set up an account. I am having e-mail conversations with a few folks about different things.
April – London – Open Scheduling
So, I am going to be traveling to the UK for the Oxford Internet Institute meeting on April 2-3 about legal issues. I am “representing the user” at least this is what my position paper will be on.
I decided it was worth it to spend week longer in London until the 11th and meet people, do some fun things, talk about identity etc.
Since I heard about Jeff Barr (an Amazon Evangelist) opening his schedule via wiki it seemed like it would make sense to do sometime. This trip is the time. It is also a good opportunity to use my personal wiki.
Here is the page about My Trip.
- I want to go to go see some cultural things.
- I am going to prepare a 30 min talk – Identity Tech 101 to talk about the current state of where things are – it will be non-technical with pointers to technical material for those who want to dive in.
- I am open to talking on if people want or just having a meal with a small group.
-
- I am interested in talking to folks working on VRM stuff
- I am interested in connecting with those exploring doing things with information cards
- I am also exploring the intersection of SemWeb and identity things.
- Travel time and options need to be considered when scheduling me.
Unlike Jeff I don’t have Amazon covering my hotel rooms. One friend has offered to put me up for the weekend of the 4th. I can’t stay there all week – I am also looking to find a couch or too.
If you have questions or suggestions please e-mail me kaliya (at) mac (dot) com with the subject “London”.
Identity Panel & Lunch at SXSW
I am really excited to be heading to Austin tomorrow for SXSW Interactive. After attending for 2 years in a row I didn’t attend last year and watched as all the tweets went by – wishing I was there.
I am facilitating a panel on Sunday morning 11:30 – it should be a lively one. OpenID, Oauth, Data Portability and the Enterprise.
It will be moderated by me, Identity Woman and include these find panelists, Bob Blakely The Burton Group, Danny Kolke Etelos, Inc., Joseph Smarr Chief Platform Architect, Plaxo Inc
The debate over identity, data and authentication is gaining ground in the social networking world. The more difficult discussion regarding enterprises and Web 2.0 has yet to start. Businesses realize that they must protect the data of their company, employees and customers. Join brave leaders from several Web Application companies that are beginning the discussion, “Are OpenID and OAuth good for the enterprise?”
Following there will be a Lunch for all those who want to continue the conversation – you can RSVP here.
There is a Project VRM Breakfast on Saturday morning (we figured that at least that morning people would be able/willing to get up early).
Monday for lunch I am inviting women interested in learning more about She’s Geeky to get together.
I will be tweeting away – and this is a good way to find me while I am there just DM me.
I will do some schedule browsing and post sessions related to identity tomorrow.
Internet Identity Workshop May 18-20
We have opened registration for the 8th Internet Identity Workshop! May 18-20th in Mountain View California.
There are a few things that are different this time around….
We have a shinny new website/blog!
Thanks to Mary Ruddy, Stas Zubalevich and Pam Dingle for helping make it happen.
We are using eventbrite to do registration – and we will be displaying the names of those who are registered.
We are asking questions as you register about what you hope accomplish /talk about at IIW and publishing them.
We have responded to the economic times and lowered the price for the first month of registration (a $50 discount for independents and a $75 for everyone else).
We have an early registration goal of 75 people by the end of the month.
We are starting on Monday morning with a hands on introduction to identity technologies and we will being participant generated sessions at 1pm on Monday.
Demo’s – community sharing of projects and products will happen on Tuesday afternoon.
We are being we have a sub theme that we are promoting – “what are the business models for identity” this is so that “business” oriented folks will attend and hopefully get some where answering this. (we might have some other explicit sub-themes we name as the workshop approaches and community members give feedback on key topics that are arising/need attention)
We will have a different venue for Tuesday night dinner!
Travel is cheaper then ever (so even though your budgets are lower you should be able to make it here for less).
The blog will have guest posts by community members leading up to the conference. (if you want to say something here just let me know)
We will have had the ID-Legal conference in April and will have a cool map of the gap between identity technologies and different legal lenses.
The same….
* We have blog badges for you to use in your posts – put on your blogs.
* We will have Monday night dinner at Tied House
* We will give community awards open style at the end of Wednesday. (if you want to be the wine/other gift buyer or donor let us know)
* The Avante (our conference hotel) will Rock!
She's Geeky #4 is happening in Northern Virginia (DC Area)
I am really pleased to announce that She’s Geeky #4 is happening in Northern Virginia (DC Area) Saturday April 18th. Registration is Open.
It is at LMI’s facilities in McLean (they donated the space). There is one drawback – it isn’t on a metro 🙁 We have a wiki up to help people coordinate rides. We plan to have an event in DC proper (on a metro line) before the end of the year (likely many months from now if not until the fall). By holding events both in and outside the city, we hope to bridge the gap between the two tech communities.
She’s Geeky in Mountain View covered a really diverse range of toipcs all
* from beekeeping to gunshot detection
* from twitter use to hardware hacking
* from personal finance to government 2.O
* from tweeking wordpress to advanced coding in ruby
I expect the same fantastic range in DC with more women from fields that we have less of in the Bay Area – defense, intelligence, aerospace, nptech, government 2.0.
We are actively looking for sponsors and accepting donations so that we can give discount scholarships to students and unemployed women.
Speaking this Spring
I have actually put a bunch of work in to moving all the content that was on the sidebar of my blog up into pages that you can see along the top navigation. They still need some more work but it is good to finally have them there. One of the pages is about upcoming talks.
SXSW Interactive,March 13-17, Austin TX.
I am facilitating a panel about OpenID, Oauth and the Enterprise. It includes Joseph Smarr, Bob Blakley and Danny Kolke the CEO of Etelos.
This is the description. I hope we broaden it to include other identity technologies too.
The debate over identity, data and authentication is gaining ground in the social networking world. The more difficult discussion regarding enterprises and Web 2.0 has yet to start. Businesses realize that they must protect the data of their company, employees and customers. Join brave leaders from several Web Application companies that are beginning the discussion – Are OpenID and OAuth good for the enterprise?
I will be facilitating a Peer 2 Peer session at the RSA security conference April 23, 10:40-11:30 on the topic Claims-Based Identity – What is the Business Case?
The user-centric identity community has been working on information cards an open standard for claims based identity architecture (as opposed to a network end-point architecture). The big question that arises is “what is the business case?” This session will be an open discussion around the existing and potential business models and cases for such a meta-system to emerge.
I am speaking at Community 2.0, on Identity Across Communities – Tools for Making it Real. May 13, 2009 San Francisco, CA
This presentation will cover the core user-centric identity technologies that are emerging to support people being able to port their identifiers and information about themselves between websites. The goal is to make it easier for people to share information along with support the emergent social effects like trust that come from persistence across time and space and ultimately build stronger communities faster. The tools include OpenID, Open Social, Information Cards, The Relationship Button from Project VRM (Vendor Relationship Management).
Online Community Unconference East
I am heading out east in February and will do several identity related events – more on those by the end of the week.
I will be once again facilitating Forum One Networok‘s Online Community Unconference East February 11. Bill Johnston has been great to work with on this event and has extended early bird for $145 registration until the Jan 22nd.
The Online Community Unconference East is a gathering of online
community professionals – managers, developers, business people, tool providers, investors – to discuss experience and strategies in the development and growth of online communities. Those involved in online community development (and social software in general) share many common challenges: community management, tools, marketing, business models, legal issues. As we have found with our past events, the best source of information on all of these challenges is other knowledgeable practitioners.
At all the online community unconferences I have offered a session about identity technologies. I am hoping that some community members working on OpenID and Information Card maybe even some ID-WSF and SAML folks too. will also join me at the event. It is a great opportunity to talk with actual adopters/potential adopters of these technologies they represent hundreds of thousands of users and because of the focus on online community managers – there is an emphasis on the human side of things not just “business models” or “technical how to”
Identity events of the year – Part 2
This is part 2 and continues from part 1. I will re post this caveat again.
I am not going to do a “top ten list” – not really my style. I tend to take things as they are and appreciate the amazing, wonderful, mysterious, sensuous, intellectually stimulating but don’t “compare” in a sort of ordered list way. So just so there is clarity on the number of things I mention I will “number” them but this is NOT a top ten list – I wrote this post as a reflection without thought to order.
(un5) The emergence of Portable Contacts was a great development out of the Data Sharing Events that I put on with Laurie. The conversation between Joseph and the MSFT guys (Indu and Angus) lead to this – sort of a practical low hanging fruit thing to do – rather then solve everything – just how to get the list of contacts I have in one place out and importable to another. Joseph’s community leadership has really impressed me to. He is all about getting things done and finding the needed elements to make things happen.
(un6) I have enjoyed watching Marc draw on his fence – yes he does this literally – and talk about his vision of the social web evolving. He “published” a book containing some of what he has been talking about. You can describe Marc as many things but I for one respect him as a visionary – ahead of his time in seeing where things will be going on the web and what will be needed. (You can see his predictions for 2009 here) Just as an example of something he said that really struck me as original and important to think about looking ahead – he talked about how groups need to live autonomously – outside any one platform or silo – and that we need a language of social verbs that are open and standard across them. Maybe some more people will “get” what Marc has been saying in this regard and some open standards can evolve to address this.
(un7) In a year end review it would be a mistake to not name the IDTBD conversation that happened this summer. You can read the whole thread of the e-mail conversation in the google group – it is public. There were in the end two different ways to look at how to organize (and I think they can complementary) one put organizational form and structure first and the other put relationship and community first and said that needed form and structure could emerge from that. In the middle of the conversation we were referred to Clay Shirky’s work – both this video about LOVE in technical communities and how it is very long lasting and sustaining and his book – the power of organizing without organization. (He also has another talk about Coordination Costs that is informative). Identity Commons is an organization being held together with many of the new super low cost tools that mean organizational overhead that was needed to organize people as organized as we are isn’t needed like it was 5-10 years ago. Having said this there is much to be improved and in the survey we sent out after IIW we asked about IC and the community wanted us to focus on supporting/providing better communication between groups and also increased PR/outside world awareness of the collaborative work happening in the community.
(un8) The OpenID Foundation part of the Identity Commons community held its first elections for the community seats on the board.
(un9) Information Card Foundation launched and is part of the community of Identity Commons. I have been quite impressed with the energy and evangelism of Charles Andres. (they too are using a low organizational overhead model for getting things done). I actually got a the Azigo card selector working on my Mac and downloaded a “managed” card from an early behind the scenes trial of CivicID. I also failed at getting an “I’m over 18 card from Equifax” – Actually the experience of their knowledge based authentication made me think my identity has been “stolen” it asked me about a bunch of loans I haven’t taken out. So now I have a bunch of personal identity detective work to do this year (I will be blogging about those adventures).
(un10) Parity Communications shipped some pretty amazing stuff and it has been a long time coming*. They are behind the Equifax I’m over 18 card issuing site using their service called Card Press for issuing information cards. (as an aside I “get the whole stock photo with people holding their hands in a card shape – but why the girl with no top on?)
* Some background I first talked to Paul Trevithic and Mary Ruddy in the winter of 2004 while working for Identity Commons I knew I had to go out and meet them – to learn what they were up to and hopefully link/sync it with what Owen, Andrew & Drummond&Co. were up to around user-centric identity. They were into Social physics along with John Clippinger and both Paul and John were at the 2004 Planetwork Conference.
Over all it was an amazing year and it seems that the coming year will continue to have this field evolve.
I am working hard on pulling together two events before the next IIW (May 18-20 – put it on your calendars). One is specifically focused on “What are the Business Models” we should have an announcement about that next week but the dates will be the last week of Feb.
The other is focused on the intersection of identity technologies and the legal realm – I am meeting face to face with Lucy Lynch from ISOC in Eugene this week to work on details for that.
The Identity Futures group continues to percolate along and is working on developing a proposal to do some scenario visioning/planning.
I am hoping to spend some more time thinking about and talking to women to understand more about their needs and practices around identity online. Just in the last week while organizing She’s Geeky (the women’s only tech conference happening at the end of January) two women have mentioned they have had online stalker experiences recently. Several also have very particular ways of presenting themselves one example is a woman who professionally they use their first initial and last name – when they submit resume’s etc and in their general life online/socially they use their First name and last initial – to ensure that they are not findable at least by an employer initially doesn’t know their full name and thus their gender.
Identity events of the year – Part 1
I am not going to do a “top ten list” – not really my style. I tend to take things as they are and appreciate the amazing, wonderful, mysterious, sensuous, intellectually stimulating but don’t “compare” in a sort of ordered list way. So just so there is clarity on the number of things I mention I will “number” them but this is NOT a top ten list – I wrote this post as a reflection without thought to order.
This morning while swimming I got to reflecting about the year in identity and it did seem appropriate to share some of them.
(un1) Bob’s Relationship paper (that I hope Burton Group will release into the world) was put forward in draft form at IIW#7 (2008a) and the Data Sharing Summit in May. It framed the problem of identity and articulated some missing pieces to the puzzle we are solving – supporting an identity layer emerge. He high lighted the fact that identity happens in the context of relationship and finding ways to document the terms and conditions in a relationship – making the relationship itself its own node and not just a line in a social graph. Since the paper is mostly been available to enterprise clients of the Burton Group and some folks in the identity community this missing piece – the node of relationship itself has not been taken up. I am hopeful it will emerge. I think some of what the Higgins project is proposing as an R-Card – a place to co-manage relationship data between two parties in a transaction could for fill this.
Update: I spoke with Bob since this post and Burton will be releasing this paper in Q1.
(un2) Facebook’s emergence as the dominant social networking service and this being the anti-pattern that the communities that I have been participating in for 6 years now had articulated was a danger that needed to be addressed preemptively with open standards that worked between silo’s.
(un3) Related to this – I am remember that summer at the invitational gathering at Hollyhock (a retreat center in Canada I love and I became the accidental poster child for) I got to meet with colleagues who lead workshops there some of whom I have known for years. They knew I was into the web and social things there – “digital identity” but this year they “got” more of what I was talking about. The reason was because of issues they themselves had – one had pictures and e-mails and other things the community had put forward around someone’s life threatening illness. They found they couldn’t get the data out. … it wasn’t there. People informally in conversations I overheard were kinda freeked out by the service (you need to remember that in Canada Facebook has incredibly high penetration into the lives of “normal” folks about 40% of all Canadians are on it – so more normal folks then in the US).
So back to the open standards working between sites – putting at least doors between walled gardens – it seems that finding the agreement and finding adoption of such open standards is difficult – or perhaps more to the point it is not a “high business priority” – it is easy to have a big network just grow and become the default. I think the efforts of the open stack community are noble and I hope they succeed. I also think they need to address some of the things that facebook messes up. These include mushing all my worlds together- (water polo from when I was in highschool, kindergarten class at school, water polo from college, water polo from the national team, highschool, elementary school 1, elementary school too, my process facilitator community, the identity community, the all the worlds I am in they are all FLAT – my social reality isn’t flat. People and the topics I am interested in at any one time come closer and go out father. I have divers interests and everyone I know is not interested in everything I do. I know this. I am not trying to “hide” anything or “be secret” I just want to respect the attention of my friends. I hope this nuanced social understanding can be grasped by someone building these tools. It is not that complex.
It may be that this kind of nuance will show up in smart clients. I am hopeful that this year there will be at least one for twitter. (I want to have two kinds of twitter friends – the ones that I read ALL their tweets (scrolling back to see what happened when I was not online) and those that i will watch passively when I happen to be online too.
(un4) TWITTER really broke on to the scene this year. I started tweeting because of Phil Windley’s comment about how it got him connected to his remote team – as a water cooler replacement – to know what they were up to in daily life (I had had an account for about a year before but hadn’t gotten into it). I was also at a talking heads forum on collaboration for a day in January and several friends were there who were tweeters so I did the laborious work of finding people to follow (back then there was no people search – you sort of found people by who you saw following people you knew).
I have several more thoughts about big things of the year. I will continue to write in the next few days. I am going to get back into blogging. These last 8 months since IIW#7 2008a I have had some rather significant personal life background noise. It is why I haven’t been writing or getting out much. So one of my resolutions for the year is to blog more.
It continues here with Part 2.
Open Standards Forum Next week
Identity Commons is an event supporter of the OASIS Open Standards Forum:Security Challenges for the Information Society next week Oct 1-3 in the UK.
From their website:
Information and communication technologies (ICT) are a major enabler of the creation, distribution, diffusion, use, and manipulation of information and have a major impact on our quality of life, our working conditions and the overall competitiveness of our industries and services. In today’s society, information and information access plays a central role, economically, socially and individually.
However, open exchange of information and access to online services also pose challenges and threats. Service providers want to authenticate the identity of individuals requesting access, and determine the resources and services they are entitled to access. Users want their identity and personal data and privacy to be protected adequately, and the confidentiality of sensitive data they are submitting to be respected.
In today’s Internet and in many large private network infrastructures, heterogeneity and diversity are the rule rather than the exception. Security infrastructures need open standards and interoperability to scale to the huge deployments that are being rolled out. Many security standards from OASIS and other organizations support a model where identity authentication, access control, digital signature processing, encryption and key management are provided as services that can be distributed and shared.
I look forward to hearing what comes out of this event.