Well, good afternoon, ladies and gentlemen, delighted to welcome everyone back to the final keynote cleany, which is to be somewhat unusual. We have another dual performance as with our first keynote and we have here from a couple Nicole, both professor Dr. Sasha palace and Dave Kerns. And I'm going hand over to them.
Thank you very much. Sasha went one up on me by putting his picture on the slide. So you know who he is. Hopefully I've seen you around the halls this week. I've been doing conferences like this for 25 years now, and it always amazes me that you get to the end to the closing and you realize that there was much more you wanted to do than you actually did. Do you wish you could really multitask and be in multiple sessions all at the same time? The other impression of course for me is that after 25 years of doing this, you know, I spend almost all of my time talking to vendors, reading their materials, talking to customers about what they're implementing, what problems they're having and so forth. So I always feel that I'm going to be a little jaded when I come to these events and I'm going to be hearing things that are not necessarily new to me, but simply reinforce what I already know. So it's always a pleasant surprise when I hear some things that I really hadn't expected to. And that make me think a little bit differently.
I'm thinking of three incidents that happened this week that I wanna tell you about. The first was during the opening keynotes, Dr. Barbara Mandel from Daimler, when she was supposed to be talking about B Y O D bring your own device, said the device wasn't important to her. It's the data, the information that's important, and you have to concentrate on the data and the information don't worry about the device. And that's something we need to think about. The other thing was just this morning, I was talking to Deepak TSIA from VECA of exa about their new product. He was showing it to me and saying that when looking at entitlements, it used to be that in the product someone threw up when you were selecting entitlements for someone, or you're trying to find 'em for yourself. Someone threw up a whole list, maybe an alphabetical list of these entitlements, 8,000, 10,000, whatever there happened to be.
And you had to go through this list to find the ones that were appropriate for this given situation. They've changed it in version 8.5 so that there are now keywords associated with those. You no longer have to know what the entitlement is called. You simply have to know what it's associated with, gives you a shorter list, makes it easier for you to choose. It's a different way of looking at it from the developer's point of view. And that was what I heard from Susan Morrow in our consumer identity session yesterday, she was adamant that we need more female designers for software, because it's been proven that women take a more holistic approach to design than men do. We tend to be tunnel visioned. We tend to see the end point and make as straight a path as we can to it. Whereas women look at all of the things surrounding it.
I'm sure by the way, it was a woman who suggested to Deepak that they change the way they look at those entitlements. It's not a straight drive through, but look at what the business needs to do in the end. And that's what I'm taking away from this week that I've learned some new things. I learned that we need to look at everything we do from the business point of view, not from the technology point of view. We need to encourage more people from outside technology, including women to get involved in the design, not necessarily drawing up the design, but just to make sure that their input is there when we're making these things up so that they are indeed easy to use. When we get to the final end, it was a pleasure for me to be here, as it always is. It's very enjoyable to meet with old friends again, and it's great to learn something new. And I hope everybody here did learn something new while they were here this week. And if you didn't come and talk to me about it and I'll tell you what you missed. Okay. So I'll show you want to.
Thanks Dave, great number of ideas and insight, especially the thing with the women building technology. I think this would immediately impact many of the software architectures that we have around because indeed, as you say, we men, we have a tunnel view and we probably that's the reason why we're not externalizing authentication authorizations of women would, would think of this completely differently would say, where is this job I can get rid of? So let's say right to it right from the start. So, okay. So before, before giving my few thoughts, I, I, I plan this time to make the closing key a little bit differently. I'll be scrolling around and ask a number of people, what their primary most, most shaking or most interesting insight day actually had this week. Sebastian, I will come to you in a minute. So, but in the meantime, before I do this, I would like to express in the team in the, in the name of the team and hopefully also in the name of all participants, a big, big, thank you for the organizing team for Betina Butman and Le car, please stand up for a second. I think it was really, again, a wonderful organization for the rooms and the plans. There has some hassle been with the change of rooms, but I don't attribute the change of rooms to YouTube that was due to a different type of acceptance for, for, for the content. We had apologize again for this, for we having done this. Now, let me, let me go around and ask, I have some things in mind, but of course, but I'd like to get some views on the other people save usin. What's your most interesting insight from this week?
I, I think that was Mike nor funder's keynote that he gave and the, he, he stated the most obvious when we start managing identities and we centralize that and we start needing more admins to do it, to get the job done. This is something that will just not work. We need to have a tectonic shift in how we try to scale up and scale out how we manage identities if we want to do it in the internet scale. So this is my key takeaway. We need to have something that really helps us get that done.
Okay. In other words, identity management doesn't have the economies of scale we need for getting further beyond the point we are today. Yeah. Okay. That's indeed a valid point. Mike, what do you think is the most interesting insight of this week?
Well, well, I, I, I obviously am very interested in the cloud and what I have seen this week is some very interesting nacent developments regarding I identity providers and identity management in the cloud, and also about cloud aggregation services that, that, that, that seem to be appearing.
Thank you. Here's a guess. I'm very interested. D what is your takeaway of this conference is your first time, I guess, right. Everything
Awaits us did no, it's not my first time to the conference. Actually. I think this is my fourth or fifth year. I attended a session today that discussed open APIs as a representative of the standards community. This is very near and dear to my heart. So I really love that session that was far and away my favorite. And that was not an Oasis session by the way.
So open API as a trend, some months fail, next one.
Yeah. Coming as an infrastructure guy, you know, from authentication to more and more business driven, mature venture in the different regions of the world to of course, authorization authorization in the federated and cloud-based way. And I think I've learned a lot and let's see next year.
Okay. And the last one I'd like to ask is Jacque. Bruce, would you like to give you something about what you felt impressive at this conference? Well,
This is, this is a difficult question because I was certainly not the whole week here, a very small part of it. And half, half a day of that was mainly in the discussions that we, that I organized myself. So, but one of the things that I was typically drawn by yesterday yesterday afternoon was the discussion, which I also mentioned this morning a little bit on how to organize trust, whether that should be in the centralized way or whether it should be in the peer tope distributed way. And the point that I, by thinking about it, that I found that we shouldn't ask that, that question, but we should try to do it in a different way, somewhere in the middle. I think it got me, it got it, got me much more clarity basically about what maybe the steps are to be in order to get further in this, in this whole discussion about building, building trust platforms and the tools that we need altogether there. So it certainly gave me some further steps in the discussion and for the rest. I enjoyed very much the, the corridor discussions in this particular event.
Thank you, Jack. And of course, Nigel, last one, I'd like to ask about your impression, contentwise what you've heard, especially in your role as the chair executive of your organization.
Well, I I've had the privilege and I'm not sure how many other people have had this privilege of sitting through every one of the preliminary presentations I have been required. So to do, I suppose, I mean, two quick reflections. One is the power of ideas. And I mean, I like the notion that we begin with thought leadership and thought leadership is what frames everything else. And I mean, the point that was being made about, you know, that the business must drive our thinking, not technology culture drives our thinking. I mean, culture is central business is central technology. Increasingly we are even beginning to see in technology circles is, is a servant. And I think it's a problem that it's typically technology people who are making decisions about technology. And I think this is the point you're making about women's participation more diversity in, in framing, the questions and the organization, which I run in Washington. Our motto is asking tomorrow's questions. It's all in the question. And I think this week, we have seen some very creative solutions to questions, which we know are important. My question is what are the emerging questions going to be
Very important point? So I think this is a very good takeaway. Add some thoughts that I have written down all over the last couple of days. So first of all, I had an interesting discussion late night at the bar was not at the P reception, unfortunately about whether things in these types of conferences and was not explicitly mentioning EIC, is there really something new? So do don't we hear the things every year, the same, and we are going back and meeting the friends, but actually there's no new content. Well, actually as ski food is stuff I compared with my notes from last year and you know what, there's a lot of new things, a very, very interesting, very also industry moving things like ski, for example, as one important thing we didn't discuss last year at all life management platforms, we had this first initial presentation from key last year, but this time we have a whole track on this activity and of the force on ways of trying to have a privacy centric, privacy aware privacy by design technology, to work in the context of business applications.
And at the same time, reflecting also the privacy of the citizens. I noticed also a term very interesting in the presentation of Kim Cameron in the first on the first day about claims augment, have you have you, can you remember this claims augment very interesting concept where you have an initial authentication with a low profile authority and then for, because for this transaction that is needed, you need additional, a mixture of authentication or authorization, which needs to happen before you go beyond that step and have access or have rights to execute things, idea anonymizer as a role in a, in a, in a role to play. This is really new. There's a, there's a part maturing things. We have been discussing this conference and others where from the way we discuss them from, from the level of theft and the acceptance in the industry and, and, and customer organizations have been much put forward, like bring your on device claims, claims management claims, sation claims based off authorization, cloud security, of course, GRC GRC.
Now, as I remember one sentence of Theo saying this morning, it took us, we changed the name for the identity and access staff over the years, every time with the new trend. And it took us two to three years to understand that GRC something different and left the, the term away again. So, but now GRC has developed as it as its own. Discipline is very management driven of course, and not so much technology driven, but it's part, it has its spot here in the conference and, and, and very interesting people. So it's maturing and also something I, I mentioned all all over the, the different presentations. I saw that something we were discussing as a principle to follow and to always people were saying, well, actually I don't see any acceptance in the market actually to do this is the identity provider service provider separation.
Now, if you look at the speeches this year, most of them were starting, were identity provider and service provider already separated. So this is reality. This is something we ha we as a community have achieved over time. If you think back Liberty Alliance, 2001 first initial thought about having that separation actually going and now 10, 11 years later, we, we are at the point where this is actually reality and things that have been big topics at this conference, which are not gone or, or no longer people are really talking about like provisioning. There was one presentation, two presentation of provisioning, but it's overcoming provisioning or getting from provisioning to, to, to today. So really backwards facing. So to say, just choosing the term and single sign on, have you had something discussing single sign on these days? No. It's something people address from Twitter. I've read the Twitter, the tweets over the week. I was not contributing for the sake of time that I was reading them two, two things that I probably bear in my mind, bring your own identity.
Interesting concept, actually, actually, this is, this is reflecting reality, right? I mean, as who said that one, one of the people said that actually using identity, it was Kai Berg this morning saying that actually creating identities is a strange concept because I mean, I am, and I have my identity. So why should someone else create my identity, right? And the other, the other term, other sentence from, I forgot fromt systems bring your own device, brings your own vulnerabilities also interesting. And also a quote, more security requires partial identities. So getting this partial identity concept implemented, okay. I, I have some more time for a few more thoughts.
I personally liked very much also the speech of Emilio. Mardini at least the two-thirds of its presentation. I was not really understanding the movie probably cause I do not understand Italian, but what I really took away is that cloud, if you, the way we are using words is very important. And we should think about this and cloud as a term, being the materialization of dreams as com to technology, being the materialization of our process and, and, and, and day to day improvement, wishes, identity being the gold standard for e-money online. Anonymity is in, Oxyon also something noted and there is no internet without future. I identity currency, very, very interesting subject. So this goes way beyond technology. This even goes way beyond management aspects like GRC. It goes into what you said, Nigel, that is important to think about future questions and to think about social context and, and economic aspects. And these are, these are thoughts we should take away and leaders through the next year. So what actually will be the identity currency of the future? What will be the electronic currency will be identities electronic currency, I guess. Yes. We will see how we're going to be able to manage this over time. So this was my summary and my ideas. I took away from the European identity and cloud conference 2012. I'd like to hand over, back to Nigel for the last few words.
Speaker 11 00:19:54 Yes.
Thank you very much. Well, we have finished in a timely manner and I was noticing that the tweet stream had lagged. I think perhaps most of our tweeters have already departed, but it was good to have these engagements with the, with the tweet stream and with the wider conversation as part of this, this closing, this is an interesting model for how one might close a conference. I'm I'm learning all the time. We have a slide about next year's conference. Is that right? Yep. So your attention is drawn and you can pull out your calendars or PDAs, or however you do your scheduling and get this in now, before other things come in the way for so many of us, we spend much of our time in conferences and generally speaking, they arrange themselves so we can attend the ones we choose to, but just sometimes they conflict, which is another good reason for using Twitter. Because here you can follow streams from two or three different events at the same time, which some of us have been doing for the last three days. Been very good to welcome all of you here. I can't see what you're saying.
Speaker 12 00:21:05 That's my mistake. Yes. There's there's 10 13.
Oh, I see. We have moved backwards a thousand years. This, this is a profound move on the part of cupping, a cold. We are seeking start again a thousand year perspective and therefore next, next year's conference, we are moving back by a millennium to gain a broad view of the cultural and social issues involved in these technologies. And there will be medievalists giving the keynotes, well, this is another new way to end a conference. And so thank you all very much.