Cloud Computing Economics - There Is No Free Service

Cloudonomics Journal

Subscribe to Cloudonomics Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Cloudonomics Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

identification system interfaceThe dual purpose of our upcoming London event is to showcase international G-Cloud best practices AND also share some related investment opportunities.

To help accelerate some of these opportunities the other step is to theme the event to best describe the market opportunity. In this case one  of the headline topics is ‘The End of the Password’, and I will be representing startups with technologies related to this specific industry development.

The relevant Digital Government area is ‘Assured Identity‘, in short a best practice that is based on determining how secure a username & password sign-on process is, rating it on a scale of 1-4.

It can be made more secure by adding steps like a key code, biometric scan and so forth, and furthermore government bodies and even post offices can conduct ‘enrollment’ procedures that link a physical authentication with an online account.

By this I mean they have you visit their office where someone confirms your online ID is a match. This combination means they can build considerably more secure Internet access methods and indeed in general will form the keystone foundation to a highly integrated Digital Economy.

Identity authentication innovations

However the challenge that experts are starting to identify is that of course this is compensating for the weakness rather than addressing the root issue, and so key new innovations are those that do away with the password entirely are quickly gaining mind share.

Good articles for a quick insight into what the market thinks are this ZDNet article on the end user agonies of password breaches, and the fact the Microsoft’s security buff has already declared it dead.

What other methods are possible? Well given our event is being hosted at the Canadian High Commission, as part of showcasing Canada’s brightest stars in these kinds of areas, then one key example is Bionym. This generates the equivalent of a unique username and password sign on method, from your heartbeat!


The post The End of the Password! appeared first on Cloud Computing Best Practices.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at