...
Time | Activity | Presenter | Resources |
---|---|---|---|
15.00 | Welcome | ||
15:10 | Community Tagging (a.k. Pixie Dust) | ||
15:20 | Cryptech HSM - Preparation phase | ||
15:30 | IdP as a Service Business case | ||
15:40 | ORCID as IdP of last resort | ||
15:50 | Second Factor Authentication - Distributed Vetting | ||
16:00 | Discovery | ||
16:10 | Close |
...