Sunday, June 17, 2012

Waiting Is

"How much might a reliable unique link between user and personnel wireless device have made in the scenario being discussed?

"By reliably authenticating the user to the network as who she/he is claiming to be, certain exploits are detected and/or prevented. Passwords and credentials have proven to be insufficient for the desired utility. 'Conveniently authentic' seems a worthy and attainable goal."

"Identity Tether?"

To prepare for 'grok' often requires the invocation of 'waiting is".  He wondered, is this another of those times?

© 2012 Buzz Hill

No comments:

Post a Comment