Posts tagged 'hosting' – Page 6

articles

Automating Communication Privacy

Last week we posted an idea for automatic processing of legal agreements. Today, we want to show a case study, which is still far from complete and definately not final. What this demonstration captures is how we want other parties to communicate with us. Something like this could be used by companies to automatically decide whether they can sign you up for email marketing, and so on. Moreover, it provides handles for law enforcement.

>> Continue reading <<

articles

Automating Legal Terms

Legal terms on the Internet are a nuisance. The term TL;DR ("Too Long, Didn't Read") is used to indicate how meaningless the wordy drivel has become, due to sheer length. Interestingly, contracts have a lot of similarity. We should be able to automate them, in fact.

>> Continue reading <<

articles

New Web Era 1: Frontends and Backends

We published articles on pernicious developments on the web; now it is time to explain how we see this improve under the InternetWide Architecture. As usual, our approach is practical, but we don’t shy away from adopting new standards if they improve the overall situation.

>> Continue reading <<

architecture

Identity 5: Integrating Kerberos and SAML

The ideal identity system integrates well with the web, and with non-web applications. The systems that are most seriously used in these realms are SAML and Kerberos, respectively. But until now, they didn't mix...

>> Continue reading <<

architecture

Identity 4: Tips and Tricks

The various forms of identity offered under the InternetWide Architecture can sometimes be used in clever ways, for example to construct identities with limited access or temporary validity. A number of possible tricks follow.

>> Continue reading <<