"Thanks to the interests of organizations, what nearly everyone sees is security. What everyone will likely want is a superset, the best their authentic identity has to offer. That is where vision will separate the leaders from everyone else.
"It is not just the fusion of two legacy categories, security and personal authentication. It is, in fact, a quantum leap in how our networked technology will serve us by conveniently tying authentic ID to personal devices and their networks.
"Yes, the classic security applications will come first. But, on the basis of convenience alone, the number of revolutionary new applications will explode.
"The cumbersome method of identifying a user has been the historic bottleneck to realizing what biology has 'known' for a very long time - identity rocks."
© 2012 Buzz Hill
"It is not just the fusion of two legacy categories, security and personal authentication. It is, in fact, a quantum leap in how our networked technology will serve us by conveniently tying authentic ID to personal devices and their networks.
"Yes, the classic security applications will come first. But, on the basis of convenience alone, the number of revolutionary new applications will explode.
"The cumbersome method of identifying a user has been the historic bottleneck to realizing what biology has 'known' for a very long time - identity rocks."
© 2012 Buzz Hill
No comments:
Post a Comment