Delivering a Context Service through Virtualization

  • LANGUAGE: English DATE: Thursday, November 10, 2011 TIME: 8:00am PT / 11:00pm ET / 4:00pm GMT / 5:00pm CET
Upcoming Webinars

Apart from defining the difference between identity and context, the second of the Radiant Logic webinar series with KuppingerCole Senior Analyst Dave Kearns as guest speaker will clarify why context virtualization is critical in the authorization and profile management realm. For both internal and cloud-based applications, contextual insight offers substantial possibilities. Combining identity and context enables businesses to reach CDI and MDM targets, bringing the discussion into the more traditional SQL/Data warehouse realm.

But what is context, and how do you extract it from existing application silos and represent it in a uniform way? In this webinar, we’ll see how model-driven virtualization is the technology at the heart of an identity and context service. Building a global data model supports smarter integration and synchronization, while avoiding custom-coded, one-off solutions. Hierarchical or graph–based organization within the model reveals how objects are related, allowing you to see contextual information across many data silos.

As we will see in this webinar series, an identity and context service creates a shared version of identities, and then links them to application contexts across the entire enterprise. This insight is the key to better segmentation and personalization, better customer service, and a quick ROI for both security and CDI initiatives.

To register for this webinar held by Radiant Logic, please click here:


Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...


Trending Videos

Next Webinar


Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00