Sunday, May 27, 2007
More Links for 2007-05-27
Good to see Kim Cameron debating with Jeff Bohren in that his characterization of Information Cards as authenticating the computer not the user has some merit. I believe that within certain verticals a relying party truly needs to know whether there is a human on the other end and not just a bot. Consider all the businesses that require licensing and the fines associated with having an unlicensed individual do financial planning, sell insurance, etc. I would love to see Cardspace 2.0 have a way that a relying party could require a claim that was implemented using CAPTCHA.
Here is a blog entry that should be mailed to all CIOs who abuse the meaning of architecture.
Microsoft has made publicly available for developer shops their internal methodology. While I know there will be a lot of downloads from large enterprises, it would be interesting to know if any folks that are employed by ECM and BPM vendors have downloaded?
Paul Toal comments on the behavior of folks within enterprises to require adherence to specifications they don't really understand. The reason enterprises desire standards is not only for interoperability but to normalize their vocabulary. Out of curiousity, it would be interesting to know how many RFPs Sun gets where they are asked if they support Java?
Before thinking about whether this is a good idea or not, I would love to understand how Directory Servers should be licensed? If by entry, then using as a blog platform would be a bad idea. I hope that Pat Patterson would agree?
Michele Leroux Bustamante shares a thoughtful way to understand all standards. I consider this a must read for those pondering SOA
Conor Cahill is pretty smart when it comes to use of user-centrics approaches within the enterprise. The one point I would probably pick on is: Users should be able to control the use and dissemination of their data. At some level, this makes sense but folks need to have a conversation of the legal liability of the enterprise itself if a user exposes their own medical information, social security number, etc using company resources. Different enterprises have varying opinions on this issue. I would have been happy if Conor shared where folks disagreed as this provides insight as well.
Johannes Ernst shares an interesting perspective of the identity landscape. I would have loved to add a third dimension that isn't about IT or business which would be the inclusion of a large industry analyst firm either endorsing or throwing daggers.
I do not like to listen to the same song over and over again, especially not when I know there is a whole album, a variety of tunes I could be listening to. Recent developments in the agile community suggest that people realise more so than ever that is it time of us to start listening to those other ‘tunes’. The agile community would be best served by figuring out ways to apply agile methods to ITIL and Enterprise Architecture than to repeat the same message regarding software development.
I bet you wouldn't expect me to say no. Fixing security vulnerabilities within products does have a negative effect on cashflow as enterprises yet are still in the mindset of asking for features they truly don't need instead of focusing on the increase of litigation targeted at IT oriented problems and the risk that sloppy vendor coding exposes their shops to. Vendors shouldn't step up until enterprise architects start to step up and demand secure coding practices of outsourcing firms, software vendors and the open source community.
It seems as if all the large vendors and their enterprise customers are abandoning Smalltalk. I sure would hate to have to sell Smalltalk as part of my job. According to Forrester, Smalltalk started its decline during the dot com era.
Links to this post: