Hexagram Base-4 – Adding the ISAAC PRNG

This is a small technical note. I integrated the ISAAC pseudo random number generator to avoid reliance on the basic mt_rand PHP function. I am using the PHP version of the ISAAC algorithm developed by Ilmari Karonen ( https://github.com/vyznev/ISAAC-PHP ). More information about this PRNG can be found here:  http://burtleburtle.net/bob/rand/isaacafa.html   I need to rewrite the … Continue reading Hexagram Base-4 – Adding the ISAAC PRNG

The Modern State as Concrete Universal

Public debate becomes impossible in the Twilight of the State. Diverse political and ideological currents – critical of the failings of modern State--, directly demand the erasure of the separation of powers, the political utilization of justice and the privilege of politics over law. The functional separation of economy, religion, law, and politics not only … Continue reading The Modern State as Concrete Universal

La España Permanente en el Ocaso de las Naciones

Ayer la Justicia Española envió a prisión preventiva a la mayoría de los miembros del ex-gobierno de la comunidad autónoma de Cataluña, encausados por rebelión. Mientras continúo trabajando en un libro --que ya tiene muchos años de preparación y que espero acabar pronto--, los sucesos de España me absorben de una forma inusitada. No es … Continue reading La España Permanente en el Ocaso de las Naciones

The Techno-Centric "blind spot" and the Next Level of Intermediation

Too frequently  technology assumes either Identity is not a problem or Identity data issues won't be ever addressed by organisations. The #identity technology market is small, innovation is very limited too, and speaking of data control few companies really "get it." Very few vendors understand the difference between managing and auditing Identity data and controlling … Continue reading The Techno-Centric "blind spot" and the Next Level of Intermediation

Segmentation of the Risk Space and Adaptive Security

Identity Data concerns also change in the context of the new, evolving network models. When organisations move beyond the traditional "perimeter", and when authentication and authorisation mechanisms need to enable users moving in a fluid way reaching the resources they want, a new security "zoning" model is necessary. The common "enterprise" model with a single … Continue reading Segmentation of the Risk Space and Adaptive Security

Expanding the Frame of Risk and Trust Management

Many Identity Management efforts --including large programmes-- are severely limited by the way organisations perceive their requirements. Demand for change and technology upgrades drive the IAM projects while Security and Business benefits are left in the background or even ignored. It is evident that IAM is still seen primarily as a "technology" to improve user … Continue reading Expanding the Frame of Risk and Trust Management

Microeconomics of I&AM: Identity Management in three slides

If I were asked to summarise my views on Identity and Access Management --what it is and what it will be-- I would first point to the complexity involved in delivering I&AM programmes. This complexity is rooted in the normal (conventional) operations of business management of the IT support functions. Given that IT is largely … Continue reading Microeconomics of I&AM: Identity Management in three slides

Derek Cabrera’s principles and axioms of conceptual systems

Source: Derek Cabrera, "Distinctions, Systems, Relationships, Perspectives: The Simple Rules of Complex Conceptual Systems: A Universal Descriptive Grammar of Cognition" - Proceedings of the 52nd Annual Meeting of the ISSS - 2008, Madison, Wisconsin, International Society for the Systems Sciences (D) Making Distinctions – which consist of an identity and an other (S) Organizing Systems … Continue reading Derek Cabrera’s principles and axioms of conceptual systems