identityunleashed.blogspot.com
Identity Unleashed: May 2008
http://identityunleashed.blogspot.com/2008_05_01_archive.html
Enter your search terms. Saturday, May 3, 2008. Is SSL secure communication. Is SSL secure communication? Many of people in IT industry will reply with Yes without any hesitation. So am I. Today I came across one of the papers published by Chao-Yang Lu at China's University of Science and Technology. Non-linear method of factoring composite numbers). Quantum computers they could actually crack SSL communication. So the time has come for industry to think of a new more secure encryption algorithm.
identityunleashed.blogspot.com
Identity Unleashed: February 2008
http://identityunleashed.blogspot.com/2008_02_01_archive.html
Enter your search terms. Monday, February 25, 2008. Why and Who of Identity Management. The one domain which is catching up on its business because of compliance. And increased awareness of data security is, Identity. Identity, The word sounds pretty much technical and new but if you actually look at it, we have been doing identity management since quite a long time. If you look at the Election cards, Ration cards in India and SSN. With all the systems in place to manage identity, Identity Theft. Traditi...
identityunleashed.blogspot.com
Identity Unleashed: March 2008
http://identityunleashed.blogspot.com/2008_03_01_archive.html
Enter your search terms. Sunday, March 9, 2008. Identity Management in cyberspace. I came across a very nice article on Identity Management in cyberspace. Here is the link. Posted by Kiran Thakkar at 12:56 PM. San Jose, California, United States. Kiran Thakkar, CISSP An expert into IDAM space working on Oracle stack of IDM products for last more than 6 years. View my complete profile. OAuth Access delegation Protocol. Is SSL secure communication. Identity Management in cyberspace.
identityunleashed.blogspot.com
Identity Unleashed: July 2009
http://identityunleashed.blogspot.com/2009_07_01_archive.html
Enter your search terms. Tuesday, July 7, 2009. OAuth Access delegation Protocol. I have created a presentation on OAuth Access delegation protocol which I would like to share with viewers. As I cannot upload presentation to my blog, I have uploaded it on slide share. Here is the link. OAuth Presentation. Labels: OAuth Identity Access IDM. Posted by Kiran Thakkar at 4:09 AM. San Jose, California, United States. View my complete profile. OAuth Access delegation Protocol. Is SSL secure communication.
identityunleashed.blogspot.com
Identity Unleashed: September 2008
http://identityunleashed.blogspot.com/2008_09_01_archive.html
Enter your search terms. Saturday, September 13, 2008. Identity 2.0 is also called digital Identity is a revolution of Identity verification over the internet using technologies like Information cards. Every entity (user) can have different Information cards as we have in real life like Driving license, Passport, SSN number etc. User can chose to present one of those available cards as an Identity proof while verification. Following are the technologies will bring difference to Identity 2.0. Identity Man...
strutsmvcframework.blogspot.com
Struts The MVC Framework: April 2007
http://strutsmvcframework.blogspot.com/2007_04_01_archive.html
Struts The MVC Framework. Enter your search terms. Saturday, April 28, 2007. Handeling "page not found" using Struts. While surfing web, Most of us have encountered 404- Page not found message. Any resource you request; If it does not exist on server you would get such an error. In struts applications when you request for x.do and if there is no Action-mapping defined in struts-config.xml file for ActionForward x; You would get such an error. Labels: HTTP error 404. Posted by Kiran Thakkar at 9:49 PM.