There are just few days left till the new year starts, therefore we would like to thank you all for your support!
Just few months passed since our last release called Tycho and yet we would like to introduce you to midPoint’s new face: Lincoln. Inspired by a man who supported internal improvements of society and orderly progress, midPoint 3.3 follows his steps with many subtle improvements to both user interface and internal midPoint logic, which takes the usability to another level. […]
The LDAP conference was held in Edinburgh this year. And it was fascinating.
It was my first time that I have visited Scotland. Despite the infamous weather conditions it was a very pleasant experience. Edinburgh is a really impressive city. And Scotland has much to offer in a form of food and drinks that pretty much compensate the weather.
It was also my first time at LDAPcon. And now I pity that I’ve missed the previous conferences. I have decided that I will not repeat that mistake ever again. The conference size is just right: enough people to make it interesting and not too many to make it a crowded place. There were LDAP hardcore topics, engineering topics, standards talks and even an excursion to digital humanities and a violin performance. Overall it was a very interesting mix.
There are not many occasions when a CxO of a big software company speaks openly about sensitive topics. Few days ago that happened to Oracle. Oracle’s CSO Mary Ann Davidson posted a blog entry about reverse engineering of Oracle products. Although it was perhaps not the original intent of the author, the blog post quite Read more about Oracle Security[…]
The user naming attribute “name” is a string attribute and can be defined manually. MidPoint will ensure that the value of this attribute is unique. Although for small setups there is no problem with entering this attribute value manually, it can be usually defined by an expression based on various UserType object properties (attributes). In Read more about Different Naming Conventions For Different User Types[…]
A significant part of open source software is developed by small independent companies. Such companies have small and highly motivated teams that are incredibly efficient. The resulting software is often much better than comparable software created by big software vendors. Especially in the Identity and Access Management (IAM) field there are open source products that Read more about Open Source Identity Ecosystem Idea[…]
My recent posts about ForgeRock attracted a lot of attention. The reactions filled the spectrum almost completely. I’ve seen agreement, disagreement, peaceful and heated reactions. Some people were expressing thanks, others were obviously quite upset. Some people seem to take it as an attack on ForgeRock. This was not my goal. I didn’t want to Read more about Pax[…]
I started my work on OpenIDM almost precisely five years ago . At that time, ForgeRock was only a couple of months old. OpenIDM was just a very small bunch of ragtag prototype code that did not make much sense. I was the only one in the team that had any product development and architecture Read more about From OpenIDM to Success[…]
MidPoint 3.1.1 was released few days ago. It is formally an update to the “Sinan” (midPoint 3.1). But this is actually quite a substantial release as the original goal of “small and quick” update started a life of its own. This is a lesson for us what can happen when a development is driven by Read more about midPoint 3.1.1[…]
North Bridge & Black Duck released the results of their 2015 Future of Open Source Survey just some days ago. Based on the information from 1300 completed responses from IT & business professionals, we can say that the community is growing pretty fast. This statement is supported by the fact that 78% of respondents said their Read more about Future = Open Source[…]