Tuesday, December 16, 2014

Netiquette IQ Technical Term of The Day - Machine Authentication, A Great Topic


Machine authentication 
from whatis.com
Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials.

Digital certificates used in machine authorization are like a form of digital passport providing trusted identification for the purpose of securely exchanging information over the Internet. Digital credentials are much like forms of machine-provided ID and password.
Machine authentication is used to authorize machine interactions on both wired and wireless networks to enable computers and other machines to interact and exchange information autonomously.  The processes of machine authentication can be performed by simple devices such as sensors and meters in infrastructure.
Common applications of machine authentication include:
  • Backup software updates and patches that must be conducted outside of business hours for optimal performance and reliability with minimal disruption.
  • Telemedicine devices that enable doctors to monitor patients remotely. 
  • Smart grid technologies that allow components of the electric grid to both communicate. 
M2M communication enables automated remote monitoring, as well as the capacity to trigger actions based on that monitoring. In product restocking, for example, a networked vending machine might message the distributor when a particular item is running low, automatically triggering an order. The technology is central to warehouse management, remote control, robotics, traffic control, logistic services, supply chain management (SCM) and fleet management. 

Machine-to-machine communication is also a fundamental technology for the Internet of Things (IoT), in which almost any entity or object imaginable can be provided with a unique identifier (UI) and the capacity to exchange data automatically over a network.  Internet of Things security and privacy are two crucial areas of concern in that scenario. Machine authentication is integral to ensuring both.
Machine authentication contrasts with user authentication, which is reliant upon the presence of a human user. 
In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

If you have not already done so, please view the trailer for my book below.