IT-Security (Part 5): WebLogic Server, perimeter Authentication and Identity Assertion

I tried to discuss about “perimeter authentication” in one extra part of IT-Security’s blogs, because this authentication’s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other.  Generally, we discussed about perimeter authentication, if a remote user requires an asserted identity […]

Weiterlesen

IoT prototype – Retrospective. What did we learn? What did we miss? (part 5)

Okay so controlling our lights now works automatically based on entering and leaving the building, thats great! But what did we learn from all this? What do we believe can be transferred to a general concept found in (almost) all possible IoT projects?   What did we learn? Communication takes more than one way Meaning, […]

Weiterlesen

IoT prototype – low-level thoughts about the 433mhz communication (part 4)

This prototype started off as a personal project. So it’s not a big surprise why the 433mhz plugs were chosen as a first tech. They are in every household and I wanted to retrofit what was already there to become a bit smarter. Being able to group, manage and remotely control these plugs is an […]

Weiterlesen

IoT prototype – low level thoughts on Oracle CEP Embedded (part 3)

In our prototype we used an Oracle CEP Embedded application running on a separate Raspberry Pi to scan the network for arriving / leaving devices and link them to our users. We could have left this logic in our Spring server and have it running in our service layer but we wanted to learn more about […]

Weiterlesen

IoT prototype – an architectural overview (part 2)

With our prototype we had a few goals: learn about the technologies that are involved in the IoT space Follow a good architectural principle get the attention (and trigger their curiosity) of visitors at different events Of course there were also the functional requirements of being able to effectively know when a user is present or […]

Weiterlesen

OPITZ CONSULTING’s own IoT prototype to demonstrate capabilities (part 1)

In the last few months, there has been so much talk about IoT it must have been hard not to stumble across a news about it. But even though, everyone talks about it, its hard to get a grasp on things. What is IoT really? Is it a method like BPM or concept like Big Data? Or […]

Weiterlesen

OMG released formal version of CMMN 1.0

In May 2014 the OMG released version 1.0 of the Case Management Model and Notation (CMMN). You can access the documents associated with it under http://www.omg.org/spec/CMMN/1.0/. Great to see that the specification also includes the “CMMN – Claims Management Example” (page 78) from our “ACM in Practice” poster.  

Weiterlesen

IT-Security: WebLogic Server and Authentication – Part 4

As I mentioned, JAAS is able for two important tasks: authentication and authorization of users. Now, let us see more about them. Authentication: Who are you? Authentication verifies that the user is who she/he claims to be. But user is also an entity and could be a person, a software entity or other instances of […]

Weiterlesen

Mit der Oracle Mobile Security Suite die BYOD-Risiken beherrschen

Derzeit nutzen viele Mitarbeiter ihre privaten Geräte im Unternehmensumfeld und speichern Unternehmensdaten darauf. Der als „Bring Your Own Device“(BYOD) bezeichnete Trend birgt für Unternehmen viele Gefahren, welche die Oracle Mobile Security Suite zu beherrschen versucht. Die Oracle Mobile Security Suite wurde von dem Start-Up Bitzer Mobile entwickelt, später von Oracle gekauft und in die Produktpalette […]

Weiterlesen

Orchestrierung der IT-Sicherheit: Wie sieht es mit der Oracle Fusion Middleware aus?

Es gab am 06. März 2014 in Hochschule für angewandte Wissenschaften München den DOAG Regionaltreffen München/Südbayern. Ich habe dort einen Vortrag über „Orchestrierung der IT-Sicherheit: Wie sieht es mit der Oracle Fusion Middleware aus?“ gehalten. Hier finden Sie mein Abstract und meine Präsentation: Orchestrierung ist eine riesige Symphonie verschiedenster Komponenten im IT-Bereich. Die Orchestrierung der […]

Weiterlesen