Hic sunt dracones
Cyberspace home of Radovan Semančík
Home
About me
Blog
All posts
Work
Photography
Contact
Credits
©
All posts
2021-08-20 »
Ten Years of Evolveum
2021-05-10 »
Ten Years of MidPoint
2020-09-20 »
How To Make Technology Presentations
2020-09-17 »
MidPrivacy: Data Provenance Prototype
2020-03-11 »
Open Source Is Not A Business Model
2020-03-04 »
Dear open source developers, do not work for free
2020-02-12 »
Restart
2017-01-02 »
midPoint in 2016
2016-06-27 »
MidPoint 3.4 (Heisenberg) Released
2016-05-27 »
There is No Security without Identity Management
2016-05-18 »
Test-Driven Bugfixing
2016-05-11 »
OpenLDAP Management
2016-03-09 »
Smart Match
2016-02-17 »
Access Certification in midPoint
2015-11-17 »
LDAPcon 2015 Is Over
2015-08-13 »
Oracle Security
2015-06-09 »
Open Source Identity Ecosystem Idea
2015-05-25 »
Pax
2015-04-27 »
midPoint 3.1.1
2015-03-24 »
Comparing Disasters
2015-03-17 »
How to Get Rich by Working on Open Source Project?
2015-03-12 »
How Precise are the Analysts?
2015-02-27 »
Hacking OpenAM, Level: Nightmare
2015-02-17 »
Evolveum Winter 2015
2015-02-10 »
MidPoint 3.1
2015-01-14 »
2015
2014-11-20 »
Never Use Closed-Source IAM Again
2014-11-04 »
What can we really do about the insider threat?
2014-10-24 »
How to Start Up an Open Source Company
2014-10-20 »
Project Provisioning with midPoint
2014-10-14 »
The Old IDM Kings Are Dead. Long Live the New Kings.
2014-10-08 »
Five Practical Ways to Ruin Your IAM Project
2014-05-05 »
EIC 2014 Beer Garden Talk
2014-03-25 »
Open Source Infrastructure
2014-03-05 »
IDM Antipatterns and Best Practice
2014-02-28 »
Developing Newton
2014-02-19 »
Enlightenment
2012-12-11 »
Coeus
2012-07-30 »
How I Lost My Faith
2012-07-16 »
Clouds, Interfaces and Monsters
2012-07-03 »
Enterprise Identity Management
2012-06-25 »
Rhea
2012-05-16 »
Use the Source, Luke
2012-05-11 »
The Law of Two Years
2012-04-13 »
SCIMming the Surface
2012-02-07 »
Phoebe
2012-01-10 »
Open Source Identity Management Systems
2011-12-09 »
Sapienter resistere
2011-12-01 »
Interview
2011-10-24 »
MidPoint
2011-07-08 »
Temperaments
2011-06-03 »
Cycles
2011-04-26 »
Why SOA Fails?
2011-04-19 »
The Big Picture
2011-04-13 »
Hub and Spoke Myth
2011-01-16 »
OpenIDM Design Summit 2011
2011-01-12 »
The Misery of Distributed Systems
2010-10-27 »
Giant Leap
2010-09-24 »
Facedown
2010-09-21 »
Role Explosion
2010-08-23 »
Identity Garbage
2010-08-16 »
Identity Connectors
2010-07-12 »
Reality Bites
2010-06-29 »
Sunset, Dead Horse, Magic and Usability
2010-05-07 »
Galileo
2010-04-06 »
PUT It Away
2010-02-23 »
Oversimplification and Overcomplication
2010-01-29 »
What's Wrong with Presentation Formats
2010-01-26 »
What's Wrong with SOAP
2010-01-25 »
What's Wrong with RESTful Web Services
2010-01-18 »
Garbage In, Garbage Out
2010-01-13 »
Mysterious Abstractions
2010-01-08 »
Thou Shalt Not Reassign Identifiers
2009-12-11 »
Litmus Test
2009-12-01 »
What is Resource?
2009-11-27 »
Fortune Favors the Bold
2009-10-16 »
Caveat Emptor
2009-09-23 »
Merchant's Reputation
2009-06-11 »
Metasystem and the Network Effect
2009-06-02 »
Good Vibrations
2009-05-18 »
Machine-Centric Identity
2009-04-06 »
Phish Pharm
2009-02-06 »
Abstraction Cocktail
2009-01-28 »
Get 'em up against the wall
2008-12-11 »
Blojsom
2008-12-08 »
SOA vs WOA
2008-12-04 »
Unphishable Passwords and Mallory's Vacation
2008-11-19 »
Pragmatic Software Architecture: For the First Time
2008-10-16 »
Reputation for Subjectivity
2008-10-07 »
Identity in the Mainstream
2008-09-05 »
Identification
2008-09-03 »
Can Internet SSO Really Help?
2008-08-26 »
Cloud Stuffed with Rocks
2008-08-04 »
Enough
2008-08-01 »
The Network and the Nodes
2008-07-23 »
European Court of Human Rights and Privacy
2008-06-17 »
The Thief is Yelling: 'Catch the Thief'
2008-06-10 »
Useless Account
2008-05-27 »
Evacuate the Area
2008-05-06 »
Are These Buses Going Somewhere?
2008-04-22 »
The Root of Identity Theft
2008-04-09 »
Latest Screams in the Identity Blogsphere
2008-03-25 »
Panacea
2007-11-19 »
Wrong Trust
2007-11-15 »
HTTPS Security
2007-09-23 »
OpenID Dogfight
2007-09-20 »
Damned Leadership
2007-09-19 »
Yo Ho Ho!
2007-09-14 »
King of Fools
2007-08-11 »
Software Engineering
2007-05-29 »
Basic Properties of the Persona Model
2007-03-04 »
Storm of Colors
2007-02-25 »
Open Source Myths: Security
2007-02-17 »
Open Source Myths: Freedom
2007-02-11 »
Open Source Myths: Cost
2007-01-28 »
I'm Still Alive
2006-07-27 »
I'm not dead (yet)
2006-05-30 »
Solution? Maybe
2006-05-19 »
Insecure Workstations
2006-05-18 »
The Failure of Perimeter Security
2006-05-16 »
Single Directory Paradigm
2006-05-14 »
InfoSeCon 2006 Thoughts
2006-04-30 »
Effort to implement Enterprise IDM
2006-04-28 »
National Security Office Hacked
2006-04-10 »
Automatic vs Manual
2006-03-13 »
The Fallacy of Commercial Software Support
2006-03-08 »
InfoCards Secure Zone
2006-03-07 »
InfoSeCon 2006
2006-02-27 »
Why may Bob be wrong
2006-02-05 »
Uncovering Problems
2006-02-02 »
Government Identity Skeptic
2006-01-09 »
Naive Identity Systems
2006-01-06 »
Tokens in Hypermarkets
2006-01-03 »
Enterprise Architects should really pay attention to Identity Management
2006-01-03 »
Identity Predictions for 2006 and beyond
2005-12-11 »
Virtual Personality Superfluous
2005-12-11 »
Reputation Business
2005-12-11 »
Non-anonymous Anonymity
2005-12-10 »
Global Troubles
2005-12-06 »
Personal Information Centralization
2005-11-30 »
Solaris Enterprise System for Free
2005-11-29 »
Once Upon a Service ...
2005-11-26 »
Writebacks
2005-11-18 »
Strong Auth Rant
2005-11-11 »
Enterprise IDM: Part 3: Roles
2005-10-31 »
Identity and Authentication
2005-10-24 »
Enterprise IDM: Part 2: Workflow
2005-10-13 »
Enterprise IDM: Part 1: Organizational Structure
2005-10-13 »
Enterprise IDM: Introduction
2005-10-10 »
Identity Buzzword
2005-10-04 »
Introduction to the Persona Model
2005-10-03 »
Expecting OpenSSO
2005-10-03 »
The Myth of Anonymity
2005-09-29 »
My New Blog