Articles

March, 2023 While working with one of my friends, he asked that we go over upgrading uPortal between minor versions. He has done it before, so this was more of a refresher, though he needs to teach his back up soon. I offered to write the instructions in a narrative to pass along. We thought it would make for an excellent chance to share the process in a blog, so here it is!
March, 2023 Over the past decade, a significant focus has been placed on effectively collecting and accessing data. While bringing data into a central location and making it readily available is crucial for establishing a data-driven culture, the true value lies in enabling users, particularly non-technical individuals, to easily search and discover relevant data that can be applied to their specific department.
February, 2023 Your data warehouse is set up. Your data is being cleaned according to your carefully thought out design. You have governance agreements in place with all the key stakeholders. Your systems integrations are complete. Your jobs are running as planned and scheduled. You have started to produce business intelligence reports and dashboards and everything looks great. 
January, 2023 uPortal is an open source project used by many institutions to deliver personalized views to students, faculty, and staff with links out to supporting services. This article will tell you about the Log4j issue that hit the IT industry in late 2021 and how to replace Log4j with the more secure logging library, SLF4J.
November, 2022 The Shibboleth Identity Provider (IdP) V4.x release introduced a new concept to the IdP, called the Attribute Registry. This new approach to managing how the IdP encodes (or decodes) attributes is described in this Shib IdP Wiki page. It also has a key role if you are using the Attribute Consent feature of the IdP to ask your users if they are ok with various attributes being released to a service.
November, 2022 I could hear them approaching, but the music was so faint that I thought it was being piped in over the speakers. As it got louder, eyes in the room started to find the entry doors to the conference room.
September, 2022 In the previous article in this series, I wrote about the key pillars of an information security program and the types of controls that support them. In this article, I want to speak to the way that information security leadership thinks about those central supporting ideas, and what that means for decision-making. (We will explore the actual controls, their relationship to risk, and ways they can reduce that risk in another article).
July, 2022 Learning eXperience Design (LXD) is a new approach to instructional design that incorporates human-centered design principles to put the learner at the center of the learning experience.
July, 2022 In the previous article in this series, I wrote about beginning the journey to an information security program and outlined some key concepts to think about. In this article, I want to expand on the steps in that journey through an understanding of the key parts, or pillars, of an information security program. We all know the old adage that a house is only as strong as the elements of its foundation. In this article, we will learn a bit more about those elements.
May, 2022 When Unicon was founded almost 30 years ago, information security wasn’t as serious an issue. Hackers existed, but were more curious than malevolent and caused mischief more than damage. Unicon was a pure Unix consultancy then so we understood computer security very clearly, but there just wasn’t a compelling need for a company security program.
Top