[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, February 4, 2026

Identity Enabled Networks

Identity
Author: Mark Dixon
Tuesday, August 8, 2006
8:35 pm

I recently met Rakesh Radhakrishnan, a Senior Client Solutions Architect for Sun Microsystems’ Telecommunications vertical. He directed me to his blog, Identity Centric Architecture, where he has posted links to a series of nine papers he co-authored from March 2004 through May 2006 on the topic of Identity Enabled Networks. These papers focus on one central theme – that leveraging Identity Services as reusable/replaceable Architectural Building Blocks is essential to enabling Service Oriented Architectures in a broad array of communications industry applications. Good stuff!

Technorati Tags: ,
,
,
,

Comments Off on Identity Enabled Networks . Permalink . Trackback URL
 

Whodentity Update – 060808

Identity
Author: Mark Dixon
Tuesday, August 8, 2006
8:15 pm

New addition to the Whodentity list:












Name Organization (title) Web Presence
Rakesh
Radhakrishnan
Sun Microsystems
(Sr. Client Solutions Architect)
Identity
Centric Architecture

Technorati Tags: ,
,
,

Comments Off on Whodentity Update – 060808 . Permalink . Trackback URL
 

Bob Horn in the Participation Age

Identity
Author: Mark Dixon
Friday, August 4, 2006
9:23 pm

Bob Horn is the Director of US Sales for the newly formed Sun Microsystems Software Practice, which spans the entire Sun software stack. I blogged about Bob once before, when, in his role as Director of US Identity Software Sales, he encouraged me to resume my blog after a month-long drought. We’re now putting the finishing touches on a week of sales training in Orlando, FL. When I talked to Bob earlier today, he remarked, “Mark, you’ve got to put me in your blog!”

So, in deference to Bob and his newly elevated status, here he is, in living color! Well, here he is in the limited color and resolution my Treo camera offers!

But on a serious note – why would a successful sales leader like Bob keep commenting on my blog? Why would he want his mug featured here?

I think it is because both Bob and I are in the business of enabling the Participation Age. We sell and implement products that are essential to the infrastructure that enables people to publish blogs, to build communities, to participate in interactive commerce. We help people to be not only information consumers but publishers to this environment we call cyberspace. Bob’s desire to grace this blog is not vanity, but pragmatic recognition that this type of participatory communication is what puts bread on our tables every day.

Thanks, Bob, for the insight.

Technorati Tags: ,
,
,
,
,

Comments Off on Bob Horn in the Participation Age . Permalink . Trackback URL
 

Disney Mobile – Mickey on Java!

Identity
Author: Mark Dixon
Tuesday, August 1, 2006
8:27 pm

I saw a presention yesterday about the new family-friendly mobile telephone and service from Disney Mobile.

Disney is breaking new ground in offering mobile phone features that should appeal to families. Family Locator uses GPS technology to locate your kid’s phone and show a map of the area where the phone is. The Family Monitor feature allows Mom or Dad to control how much the kids can use their phones. The Family Alert feature helps you send high-priorty alerts to family members. Additionally, you easily control when the kids can use their phones and what types of entertainment they can access.

All this neat stuff is programmed in Java on the phone and in the back end systems.

This is just one example of how Identity-enabled, personalized services are being delivered through intelligent wireless devices. Much more to come!

Technorati Tags: ,
,
,
,
,

Comments Off on Disney Mobile – Mickey on Java! . Permalink . Trackback URL
 

Whodentity Update – 060730

Identity
Author: Mark Dixon
Sunday, July 30, 2006
6:22 am

New addition to the Whodentity list:












Name Organization (title) Web Presence
Bavo
De Ridder
Ascure (IAM
Competence Center Leader)
Ruminations
on Identity


bavoderidder.com

Technorati Tags: ,
,
,

Comments Off on Whodentity Update – 060730 . Permalink . Trackback URL
 

Mobile Phones and Identity

Identity
Author: Mark Dixon
Saturday, July 29, 2006
6:20 am

I’ve just accepted a new assignment within Sun to lead the architecture and enablement services team for the new Comms vertical within Sun’s US Software Practice. Cooincidentally, later today I will accompany my 17 year old son to buy the cool mobile phone / PDA he’s been saving for. As I thought about his pending purchase and my new responsibilities, the following two statements seemed particularly relevant:

From Tom Hume‘s “Web Everywhere” presentation via Charlie Schick‘s blog: “There are twice as many mobile phones, than there are internet users of any kind. There are three times as many mobile phones than there are personal computers. There are more mobile phones than credit cards, more mobile phones than automobiles, more mobile phones than TV sets, and more mobile phones than fixed/wireline phones… 30% of the global population carries a mobile phone… Over 30 countries have achieved over 100% cellphone penetration rates… In markets such as Finland, Italy and Hong Kong the typical first-time cellphone customer is under the age of 10. It is the only digital gadget carried by every economically viable person on the planet. Younger people have stopped using wristwatches and rely only upon the mobile phone for time. It is the only universal device, and the device of the Century…”

From Jonathan Schwartz: “I’m definitely seeing the enterprise PC business slow down. Corporate users are putting off new PC’s until Vista comes into view, while consumers (witness booming results from Motorola, Nokia and Apple) are biasing away from PC’s for really great consumer devices. (Ask a teenager which they’d prefer, a new phone, or a new PC…) “

Just think – two billion phones and growing! Two billion unique Identities begging for more access, to more content, to more capability. No wonder a Sun colleague remarked, “Comms is the place to be. We are going to lead the transformation of Sun’s business.” Heady stuff! It’s going to be a great ride.

Technorati Tags: ,
,
,
,

Comments Off on Mobile Phones and Identity . Permalink . Trackback URL
 

Whodentity Update – 060728

Identity
Author: Mark Dixon
Friday, July 28, 2006
5:19 am

New additions to the Whodentity list:











Name Organization (title) Web Presence
Victor
Grey
2idi Corporation
(Co-founder, President)
Living Directory
(Developer and code architect)
CustomDynamic.net
(Principal)
 
Fen Labalme Broadcatch
Technologies
(Founder and Chief Architect)
2idi
Corporation
(Co-founder, CTO and chief architect)
OpenPrivacy.org
(Co-founder)
CivicActions
(Lead Technology Consultant)
Fen’s Stream of Consciousness

Technorati Tags: ,
,
,

Comments Off on Whodentity Update – 060728 . Permalink . Trackback URL
 

Identity Risks – Reprise

Identity
Author: Mark Dixon
Wednesday, July 26, 2006
9:06 pm

I finally got the monkey off my back and finished the Identity Risk series. Here are links to each segment:

Tags: ,
,
,
,

Comments Off on Identity Risks – Reprise . Permalink . Trackback URL
 

Identity Risks – Not Using Available Support

Identity
Author: Mark Dixon
Wednesday, July 26, 2006
8:52 pm

Why is it that so many of us are reticent to ask for directions when we are lost? Perhaps it is the innate urge to be independent, to demonstrate to the world that we can do the anything to which we set our minds. Perhaps it is the inflated ego – a reluctance to admit we don’t know everything. Perhaps it is the need to invent, to improvise, to create something new. Whatever the reason, failure to ask for directions can cause us to drive our cars in circles (my apologies to Nascar) or can cause delays in our Identity Management projects.

Most of Sun’s identity management implementations are performed by third-party systems integrators. To support their efforts, Sun has extensive online resources for these implementation parters, including a knowledge repository, online forums, training and documentation, all of which can be very valuable tools to an implementation team. In addition, we offer access to product experts and project advisors who can assist in design reviews, provide project oversight and expert advice.

Yet, I never cease to be amazed when I speak to partner personnel who have never even logged on to access these resources or request help when it is needed. It is like the proverbial husband who drives his car past the same gas station three times in a vain attempt to find his destination without stopping once to ask for directions.

Ignoring available support facilities may:

  1. Cause your project team to re-invent solutions. Your Identity Management project should seek to employ best practices in pursuit of business value, not to seek innovation for its own sake. If you can find out how others have successfully implemented their systems and learn from them, you can avoid their mistakes and minimize your efforts.
  2. Slow implementation. Your team should be focused on implementing your system, not simply learning how to do it. If the team hits hurdles they cannot cross, they may muddle around trying to find an answer themselves, when they could have easily found the answer they were seeking on a knowledge base or interactive forum.
  3. Slow issue resolution. I was on a project review call recently when an implementation engineer was struggling with a technical issue. “Have you accessed the partner forum?” I asked? “No, we haven’t got around to it,” was the reply. Images of driving by the proverbial gas station flashed through my mind.

My recommendations?

  1. Training. Isn’t this obvious? Shouldn’t you make sure your technical team is well-trained before they attempt to implement your system? You can’t expect your people to read the manual and become proficient. Maybe you can do that with a word-processing system, but not an enterprise-class Identity Management system. If your team is prepared through proper training, they will be better prepared to ask the right questions at the right time during a project. Training is essential. Take the time to do it. You will be glad you did.
  2. Vendor Resources. Become familiar with what resources your vendor offers – documentation, knowledge repositories, online forums, expert services. Make sure your team uses them all.
  3. Technical Support. If you think you have found a bug, report it. Work with your technical support team. Use the technical support resource you are paying for. But don’t expect technical support to compensate for your own lack of training.
  4. Project review / design reviews. Ask your vendor to conduct periodic project reviews with your team. Ask for technical design reviews. These can be extremely valuable exercises. In project review meetings I conduct with project teams, we attempt to ask questions in advance of when they might arise in the normal course of a project. We try to instill in the project teams a discipline to ask for directions early, so issues can be resolved early.
  5. Expert services. Don’t hesitate to secure the services of experts who can help you. Last week, I was on a 30 minute call where a product expert recommended a solution to a problem the project team had struggled with for two weeks. 30 minutes vs. two weeks? Sounds like good return to me. These expert services aren’t free. Be prepared to pay for the right expertise and experience. But it will pay off handsomely as you solve issues more rapidly and reduce project delays.

“Not using available support” sounds like a trite expression. I wish it were. So, admit you don’t know everything. Back down from your propensity to go it alone. Stop at the Identity gas station and ask for help. It will help you quit driving in circles – unless, of course, you drive for Nascar.

Technorati Tags: ,
,
,
,

Comments Off on Identity Risks – Not Using Available Support . Permalink . Trackback URL
 

Identity Risks – Scope Creep

Identity
Author: Mark Dixon
Wednesday, July 26, 2006
2:29 am

Way back in January, I began blogging about “Seven Identity Management Implementation Risks.” Alas, I addressed only five of the Risks before being distracted otherwise. Perhaps that is one of the Risks of reading my blog – coping with my fits and starts.

But here it is – sixth in a series – Scope Creep.

Yesterday, I conducted what we in Sun call a Post Project Review, a conference call to assess went right or what went wrong with a project. It is a valuable exercise focused on progressively improving our ability to implement Identity Mangement systems. This was a successful implementation project. The system went live last week; our customer is happy; the project met its objectives. But when I asked the team, “What surprised you most on this project?” the first response was, “The number of additional requirements that were added to the project.”

Our customer had hired a skilled analyst from a major consulting firm to write the requirements document. They thought they were prepared. But when the project started and we began to review those requirements in depth and prepare a system design, it became apparent that many requirements had been missed or were poorly defined. Oops! So, right up front, early in the project, many more requirements had to be defined and others clarified. A major change order had to be processed, almost before the project commenced.

Scope Creep can be deadly to a project. If our team had not been extremely disciplined in executing a change management process, the project would have been doomed to failure even before it began.

What are the effects to of Scope Creep? It will:

  1. Extend your project schedule. Your project will take longer, not only because of the extra direct effort to provide additional functionality, but because the project will stall while new requirements are being defined.
  2. Increase your project cost. More time = more cost. If not carefully controlled, all the new “minor” scope changes can add up to a “major” budget hit.
  3. Delay perceived system value. Stakeholders expect and deserve business value from an Identity system quickly. Any unexpected scope additions can delay the realization of the valuestakeholders were promised. This can undermine confidence in the system even before it is delivered.

So, what should be done? I recommend the following:

  1. Define requirements well. The first Identity Risk is Poor Requirements Definition. Do yourself a big favor and carefully define requirements up front. Then double- and triple-check your work. Make sure that you really understand and have documented what you want to have delivered.
  2. Push back on all changes. Every project that I have experienced has had changes. The trick is to make sure that they don’t just “creep” in. Challenge every suggested change, not to be obstinate, but to make sure that each change is justified. We need to be intellectually honest about what the project impact (both positive and negative) will be.
  3. Enforce a change management process. The change process must be be formal, not just a gentlemen’s agreement among buddies. This will force a process of examining each proposed change to determine why it is necessary and what schedule/budget impacts will be felt. This holds true for both fixed-price and time-and-materials projects. Some people falsely believe they can be more lax in managing changes on a T&M project. But budgets are budgets, schedules are schedules, expectations are expectations, regardless of the financial model. Change management is always needed.
  4. Your customer must formally accept all changes. It is not enough for an implementation team to record changes and hope that the project stakeholders understand. Force the issue by having the stakeholders formally approve changes. In the project I referenced above, fifteen different stakeholders had to approve the design document that reflected the many added requirements that emerged at the beginning of the project. This not only made it easier to secure financial approval for the corresponding change order for these additions, it really smoothed the way for an additional change order later in the project to cover requirements addtions that emerged at User Acceptance Test time.
  5. Document everything. The change order process should cover this, but the principle is that unless a change is documented, it may kill your budget and schedule without you knowing what hit you. Project members do change over time. Even though you think you have a great memory, that too will fade over time. Documenting all changes provides that consistent, thorough record of how changes affect your project over time.

I shared an example of a project that was successful because scope creep was meticulously managed. I have also experienced the horror of projects where scope creep literally consumed the effort and led to failure. The first example is a whole lot more fun.

Technorati Tags: ,
,
,
,

Comments Off on Identity Risks – Scope Creep . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.