Delivering a Context Service through Virtualization

  • LANGUAGE: English DATE: Thursday, November 10, 2011 TIME: 8:00am PT / 11:00pm ET / 4:00pm GMT / 5:00pm CET
Upcoming Webinars

Apart from defining the difference between identity and context, the second of the Radiant Logic webinar series with KuppingerCole Senior Analyst Dave Kearns as guest speaker will clarify why context virtualization is critical in the authorization and profile management realm. For both internal and cloud-based applications, contextual insight offers substantial possibilities. Combining identity and context enables businesses to reach CDI and MDM targets, bringing the discussion into the more traditional SQL/Data warehouse realm.

But what is context, and how do you extract it from existing application silos and represent it in a uniform way? In this webinar, we’ll see how model-driven virtualization is the technology at the heart of an identity and context service. Building a global data model supports smarter integration and synchronization, while avoiding custom-coded, one-off solutions. Hierarchical or graph–based organization within the model reveals how objects are related, allowing you to see contextual information across many data silos.

As we will see in this webinar series, an identity and context service creates a shared version of identities, and then links them to application contexts across the entire enterprise. This insight is the key to better segmentation and personalization, better customer service, and a quick ROI for both security and CDI initiatives.

To register for this webinar held by Radiant Logic, please click here:


Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00