"How much might a reliable unique link between user and personnel wireless device have made in the scenario being discussed?
"By reliably authenticating the user to the network as who she/he is claiming to be, certain exploits are detected and/or prevented. Passwords and credentials have proven to be insufficient for the desired utility. 'Conveniently authentic' seems a worthy and attainable goal."
"Identity Tether?"
To prepare for 'grok' often requires the invocation of 'waiting is". He wondered, is this another of those times?
© 2012 Buzz Hill
"By reliably authenticating the user to the network as who she/he is claiming to be, certain exploits are detected and/or prevented. Passwords and credentials have proven to be insufficient for the desired utility. 'Conveniently authentic' seems a worthy and attainable goal."
"Identity Tether?"
To prepare for 'grok' often requires the invocation of 'waiting is". He wondered, is this another of those times?
© 2012 Buzz Hill
No comments:
Post a Comment