Learn from the perspectives of our industry experts in our series of blog posts.
Check back for new posts on the latest in select open source projects.
Latest Blog Postings
On Thursday, March 28th 2013 at 10:00AM PDT (1:00PM EDT), the Unicon Cooperative Support Team held the first quarter Cooperative Support Sakai Summit teleconference. A PDF of the presentation is attached below.
On Tuesday, March 26th 2013 at 8:30 AM PDT, the Unicon Cooperative Support Team held the first quarter Cooperative Support uPortal Briefing teleconference. Slides from the presentation are attached to this page (below).
Some Highlights of the Call
A quick post to publicly share the slides for today's Cooperative Support for CAS Update briefing.
Part of a series on reviewing CAS configuration, this post discusses failed login attempt throttling in CAS.
Adopters should consider whether and which throttling configured how would be appropriate for their CAS implementation.
This is a post about one of the quickest and most important things to check in reviewing CAS configuration: ensure that the demo password handler has been turned off. This post is one of a series on reviewing CAS configuration.
I was helping with a CAS upgrade to CAS 3.5.1 the other day, in the course of which I reviewed the configuration. This blog post begins a series of posts about items in that and other CAS configuration reviews.
These posts won’t be the full report, and will be redacted to anonymize and generalize some of the recommendations.
Why do configuration reviews?
Reviewing CAS server configuration
In which I discuss Unicon-involving progress on Jasig CAS in the last quarter, and a bit about CAS more generally.
Back to school is a harrowing time for almost anyone involved in delivering technology-based services in education. At this time of the year, Unicon often receives calls from business or IT leaders desperate for additional help in resolving a technology-related crisis. Unicon staff has extensive experience resolving application, performance, and infrastructure-related incidents. We have distilled a set of best practices for managing through high risk/high visibility IT incidents.