* Readers chime in with their predictions for ID mgmt. in 2006 Just before Christmas, I asked you to send me your thoughts on what happened in the identity management world during 2005 and what might happen in 2006. The response was heartening, but if I try to publish them all it’ll be 2007 before we finish! Instead, I’ll try to summarize as best I can.But first a downer. Quest/Vintela’s (and formerly Microsoft’s identity management guy) Jackson Shaw wonders if 2006 will be the year that people will wake up and realize that identity management “is only the aspirin to the headache we have engineered for ourselves. What are we (end-users, companies, ISVs and platform vendors) doing to solve the root cause of that headache – interoperable authentication, authorization and identity protocols? Identity management is still meta-directory on steroids except we have built our house of cards even higher now.” A downer looking back, certainly, but looking forward it could be a harbinger.One of CA’s predictions for 2006, for example, is that security defenses will converge. According to the company: “2006 will mark the beginning of a security market shift as various security elements which were once dealt with separately, such as threat and identity management, begin to ‘talk to one another’ for even tighter security controls.”Sun’s Mark Dixon offered: “2006 will bring new methods for more quickly and easily implementing identity management solutions.” (I think this will require more interoperability.) Digital ID World’s Eric Norlin chimed in with, “The divide between user-centric and enterprise identity management is the No. 1 conversation in 2006.” He adds that what he calls “URL-based identity” (think Sxip, LID, OpenID, iNames, etc.) will “accomplish some interoperability tests in 2006, gain some traction and stop just short of a critical mass.” But it will push the cause of interoperability.I’m heartened to see that these “predictions” fall nicely into line with two of the resolutions I promulgated last week: convergence of standards and convergence of architecture. Let’s hope we’re all right. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe