Vittorio Bertocci

Scatter thoughts

Browse by Tags

Tagged Content List
  • Blog Post: Simon Says

    [No technical content in this uncharacteristically brief post, be warned] This morning I was leafing through the September issue of Wired, when I got to an interview with Simon Singh (no links to it, Wired’s Web site does not appear to have the September issue up yet). Mr. Singh is a great science writer...
  • Blog Post: SelfSTS: when you need a SAML token NOW, RIGHT NOW

    A little new toy for you claims-based identity aficionados to play with! Available here . Tokens are the currency on the identity market. Any identity solution you develop will require you to acquire & consume tokens (& associated claims) at some point. ADFS2 is super-easy to install, but does...
  • Blog Post: Theseus’ Ship

    Doodling while attending panels at the EIC . The ones who attended yesterday’s session on claims and cloud will understand ;-)
  • Blog Post: Claims on the Client…

    …and fire in the sky ♫ Don’t you hate it when a technical blog devolves in what is for the most part a series of announcements? That’s kind of what happened to mine. The reality is that making the things which get announced here take an inordinate amount of time, and that every remaining moment (usually...
  • Blog Post: Windows Identity Foundation Overview Session recording: drawing-on-slides presentation technique

    In the same spirit of experimentation shown here , in the last year I’ve been using another fairly original presentation technique. The original aim was to mitigate my being chronically late in turning in slides for events but it turned out something that audiences actually like :-). The technique is...
  • Blog Post: An example of trusted subsystem fail in meatspace

    Here I am, stuck in Sydney airport for various cascade delays but awarded with the Gift of Free WiFi. I am coming back from a awesome 2 weeks in Australia and Nw Zealand, where I met great customers & partners, enjoyed the company of amazing friends & colleagues and drew few chuckles (while hopefully...
  • Blog Post: DeepZoom & Identity Storytelling

    Call them chalk talks, call them interactive sessions, I love that kind of sessions. You can pull it off only if you have a small audience (or at least if the assertive elements are a manageable number), but they’re the most effective. The interesting/challenging thing about those is that you never...
  • Blog Post: Think inside the box

    Yesterday evening I stumbled upon a curious article on an Italian online magazine, and as it became a conditioned reflex I posted it on my Facebook’s wall: then i promptly forgot everything about it. This morning I stumbled upon a blog post from a good friend of mine in the identity community, who (not...
  • Blog Post: What goes into claims

    2 weeks ago Donovan and I were at RSA, manning the Geneva booth: the interest about this technology is overwhelming, as well as the enthusiasm for the claims based approach. Now that there’s actually something to toy with, as opposed to hand-weave how beautiful a claims-flavoured world would be, I...
  • Blog Post: One does not simply walk into Mordor, or Home Realm Discovery for the Internet

    Interesting discussion going on on Chris’ blog about OpenID & usability. There are many aspects I’d like to discuss, but it’s 11:34pm and “tomorrow” I have a conference call at 7:00am (sometimes the fact that the Earth is round DOES suck: sorry, Cristoforo): hence I better pick carefully. Ah, did...
  • Blog Post: Identity pun

    Sorry guys, this will make you cringe but I can't help myself: this came out while I was reharsing a presentation just minutes ago. Ah, and you'll get it only if you're identity-sick :-) A passive client enters a shop, and starts looking around. A salesperson approaches: "Sir, can I help you...
  • Blog Post: Roles? Those are claiiiiiims!

    [Warning: if you are not an identity geek, don't read] People tend to approach new things by understanding how they relate with what they already know. That's natural, and that's also a very effective strategy: however it can only get you so far, and if you don't start thinking out of the box/venture...
  • Blog Post: On-premises, hosting & cloud: a metaphor for understanding how they differ

    [Dear loyal readers, be warned: this post will contain some identity, but it is more about "pure" architecture & cloud services] On a flight Honolulu-Seattle; vacation is over, and I'm back to sharing with you my wild thoughts (ok, not ALL of my wild thoughts :-)). Have you noticed how people...
  • Blog Post: Visual Studio web project template for Zermatt... and your CardSpace RP ASP.NET web site is up&running in just 37.1 seconds

    You would not believe how often I have to set up identity enabled web sites: for verifying a theory, for proving a point with colleagues, for demos and events... really really often. Vast majority of cases those are barely proofs of concept, nothing elaborated, so I've been working for reducing the overhead...
  • Blog Post: Claims propagation: Kirchhoff or maxflow?

    In the last week or so Paul Madsen made at least a couple of posts with strong visual components: one that resumed my old 2005 post on a notation for message crypto, the other on Feynman diagrams . Nice! Paul, when I am in that mood I find especially pleasant to thumb through Tufte : I highly recommend...
  • Blog Post: Voting for the Italian government election via mail

    It's that time again. Few months ago the Italian government fell, and as a good citizen I am called to the right-duty of casting my vote for electing the new one. There's a little detail, though: while in the past that meant taking a short walk through my scenic little home town and meet few old friends...
  • Blog Post: The Tao of Authentication (Part III - last)

    (continues from Part I and Part II ) Finally we've lined up all the elements we need for understanding how we can get rid of the 1-2-3 tyranny, and deal with our business requirements directly instead of relying on an old model that forces us to perform unnecessary steps and introduces artificial dependencies...
  • Blog Post: The Tao of Authentication (Part II)

    (continues from Part I ) You can consider this post and the fine grained analysis we made in Part I as a down payment for grasping the implications we'll see in Part III, which I plan to post in few hours (almost done). I was planning to have just 2 parts, but it came out far too long and I need 3 :...
  • Blog Post: The Tao of Authentication (Part I)

    From time to time it's healthy to challenge the assumptions, and look at (allegedly) familiar things with new eyes. Few weeks ago I had to do just that with the idea of authentication : I wanted to shake a bit an audience of architects, and make them * think* about the problem instead of relying on the...
  • Blog Post: Understanding Windows CardSpace on the front page of Channel9

    [ edit: apologies if this shows in your aggregator twice. I am testing the AmazonConnect feed ] Last week Caleb and I have been surprised in my office by Charles "Carlo" Torre and his camera. The result is an impromptu interview about CardSpace , which is currently on the front page of Channel9 (direct...
  • Blog Post: Modeling Reality (II)

    Ah, the beauty of models. A good model can capture the essence of a system, a phenomenon, anything: it allows you to easily manipulate things, make predictions, transport the knowledge you already have of a domain to a new one. It's just great, and as we will disclose more things about Oslo I am sure...
  • Blog Post: The video "WS-Trust - Under the hood" is back online

    It turns out that the channel9 video on ws-trust was down for (quite?) some time. I am pretty surprised by the number of people that is still checking out that clip! Now it works again, provided that you view it by clicking the download button (which, by the way, points to here ) as shown in the screenshot...
  • Blog Post: I smuggled a neologism... or did I?

    Back in October 2005, few weeks after I moved to the US, I wrote a blog post in which I introduced the idea of a collective name for the federated resources accessible to a company. One of the names I proposed was federnet . At the time I made a quick search on the Internet to see if anybody was already...
  • Blog Post: Waiting for a physical copy...

    ...here there's the best approximation I found (short of a printout, of course, but that would be cheating:-) ). My wife just got a Sony ebook reader ; once we discovered it reads SD cards, we wanted to test it with a prerelease PDF of the book . Looks pretty good, though it's a tad too small with the...
  • Blog Post: Year's end blabbering: Omnidirectional Identities

    On the Paris-Seattle flight, coming back after 2 weeks spent stuffing myself with all sorts of food with the excuse "after all, you can't find this in USA" :) Before hurling myself back in the vortex of daily work, and celebrate the end of the year with something crazy, I want to take some time writing...
Page 1 of 3 (61 items) 123