Blog
IIW and VRM Report
by Craig Burton
At the first of the month I attended IIW 14 in Mountain View . I also attended the VRM workshop on the 30 th . The VRM workshop was hosted by Ericsson. The IIW was held at the Computer History Museum. Before I summarize what happened at those events, I want to give a little background on IIW. IIW IIW uses a format referred to as an “unconference.” The main purpose of an unconference is to avoid the traditional design of a conference. A way I have heard it described is the format developed by Harrison Owen. Legend has it that Owen noticed that during a conference, most of the real...
Blog
Security > 140 Conversation with Craig Burton
by Craig Burton
I had a conversation with Gunnar Peterson recently. Here is the transcript of the exchange. It is short but worth looking at. Today's Security > 140 Conversation is with Craig Burton is a Distinguished Analyst at KuppingerCole, in his  recent work, Craig explores the API Economy and how participating in the API economy reconfigures organizations' priorities. Gunnar always asks insightful questions. I really enjoy his presentations each year at the Cloud Identity Summit. Not sure if I will be speaking this year or not.
Blog
More on the Open API Revolution
by Craig Burton
As I said in an earlier post, the folks as Programmableweb.com announced the that the number of open APIs they track reached an unbelievable number—4000—in record time. The published this graph showing the hockey stick growth rate: Figure 1—Total Number of APIs source: Programmableweb So lets take quick look at the dynamics of this growth rate. Phil Windley helped me out and here is what we came up with. The data could be interpreted as a power law. Phil  used this: Figure 2—Extrapolating the Numbers source: Craig Burton and Phil Windley But I am going...
Blog
The API Computing Magic Troika and the API Economy
by Craig Burton
Intro Provocative quotes: Baking your core competency into an open API is a economic imperative. source: Craig Burton If you are not engaged in generating or enabling open API’s for your business—you are not in the game. source: Craig Burton Social—, Mobile—, and Cloud-computing are hot. The API computing magic troika is white hot. source: Craig Burton Ubiquitineurs don’t litigate or file for patents. Litigation and patents are the tools of the purveyors of scarcity. Source: Craig Burton I talk to my buddy and visionary Doc Searls almost everyday. He is busy...
Blog
Steve Jobs: cause to reflect
by Craig Burton
I am the same age as Steve Jobs. So when Phil Windley sent me the link to the 1985 Playboy Magazine interview of Steve Jobs (just before he was forced to leave Apple) I had to laugh at some of the questions made by the interviewer and remember all of the things that where going on in the industry then. During the 80’s I worked for Ray Noorda at Novell. My job was to create and drive Novell’s strategy. The plan was simple, give real freedom of choice to the customer and be interoperable with as many networks and computers as possible. By 1985 Noorda was finally coming around to...
Blog
Stop Using the "C" and the "E" Word
by Craig Burton
While attending the Cloud Identity Summit last week in Keystone Co. I noticed a usage trend that needs addressing. Almost without exception, the discussions around identity and identity technology used two categories for defining market segments. The two categories are: The Consumer The Enterprise These ambiguous categories are hindering moving forward with identity discussions and productivity. Every session I attended, I challenged the presenter to define these terms. Without exception, the confusion and ambiguity were rampant. For example, where are the people that don’t...
Blog
How to Spot an Unnecessary Identity Fail
by Craig Burton
I’ve been watching the recent announcements about how hackers—some speculate foreign countries—have cracked the security infrastructure of a system and have stolen the names and passwords of thousands—sometimes millions—of customers. The details of all these disasters are not what I want to talk about. Just this simple and seemingly obvious point. Any system that stores the names and passwords of anyone is a failed security design. Symmetric vs. Asymmetric keys In the late seventies, these three guys—Rivest, Shamir and Adleman (you probably know them as “RSA”)—published a paper...
Blog
Mono Resurrects Itself as Xamirin
by Craig Burton
When I was deeply involved in technology and company acquisitions at Novell, I learned the hard way how difficult it is to merge disparate corporate cultures. Money usually only helps a little. Company after company acquired by Novell disappeared from the planet. Often times with disastrous results. It was only on occasion that an acquisition yielded any measurable benefit. Then I heard the welcome surprise, Miguel announced the formation of Xamarin . Unlike the bumbling headless Attachmate strategy, he nails a clearly articulated plan and vision for Xamarin. “We believe...
Blog
Bringing the Web to Life at Last
by Craig Burton
It isn’t very often that an Internet principle comes along that is so important that it actually affects almost everyone and everything. The Live Web  is one of those Internet principles. The Static Web — the Internet as we know it today — has no thread of knowing or context. Until now, there has not been enough infrastructure in existence for a computer to do the work of presenting the Internet in a context of purpose. The Live Web presents an infrastructure and architecture for automating context on the internet. The Live Web brings to life the notion of context automation. The...