• Whitebook Digital Platforms - a Step in the Right Direction

    The German Government is evolving its strategy on digital platforms, as we had already reported earlier (Digital Sovereignty - Participate! Contribute!, Whitebook Digital Platforms in the Makes). The expected White Paper has been published in March 2017. In4com.de has reviewed the paper and summarized the most important results with respect to digital sovereignty being at the core of in4com.de agenda. The civil society has to stay alert due whitepaper shortcomings. Also, ongoing international trade negotiations may have huge negative impacts on privacy and digital sovereignty (in4com.de has commented on this).

  • Hidenets Project

    HIDENETS Highly Dependable IP Based Networks and Services

    The aim of the HIDENETS project (Highly Dependable IP Based Networks and Services, click here for a summary) was to develop and analyze end-to-end resilience solutions for distributed applications and mobility-aware services in ubiquitous communication scenarios. Technical solutions have been developed for applications with critical dependability requirements in the context of selected use-cases of ad-hoc car-to-car communication with infrastructure service support.

  • Whitebook Digital Platforms in the Makes

    Manfred Reitenspiess, owner of in4com.de, has provided extensive comments on the greenbook „Digital Platforms“ (Grünbuch „Digitale Plattformen“) as published by the German Government (we had pointed out the opportunity to contribute in „Digital Sovereignty - Participate! Contribute!). The received comments were summarised by the German Ministry of Economy and Energy BMWE. In4com.de comments were cited a number of times and are completely available for download. In a follow-up step (beginning of 2017) a whitebook is to be published as a step toward a German digital agenda. The whitebook shall come up with specific recommendations and calls for action with respect to the evolution of digital platforms (see the official webpages of the BMWE).

  • [Monitored] Mobility – a Safe and Secure Experience!?

    Digital Sovereignty 2.1 - Mobility Services

    It is no longer a question, but a fact that the Internet is in the car. After discussing a number of useful mobile services in passenger cars, we have to conclude that our digital sovereignty will be lost if we do not take adequate measures

  • Secure Internet Services - more on their design

    Digital Sovereignty 1.4 - More architecture charactistics of secure Internet services

    We have already shown in Architectures for Secure Internet Services,  how decentralization, anonymity, and resilience can help to assure digital sovereignty (the what and why is discussed in more detail in"Digital Sovereignty - What is it?", "Digital Sovereignty – why we need it", "Giving up Digital Sovereignty?"). In this report we will introduce two more foundational and necessary architecture principles – object orientation and  need-to-know principle.

    Real World Role Model Offset in the Digital World

    Living together in our society as well as the functioning of a corporation depend on a clear role model and people acting according to a given role at a certain point in time. A number of roles are assigned to each of us, depending upon the environment in which we are acting: mother, pilot, chancellor, software programmer, trucker,…

  • Secure Internet Services - how to design them

    Digital Sovereignty 1.3 - Architectures for Secure Internet Services

    Today’s data center focused and organized Internet services are just like dinosaurs – they were very successful at their time, but eventually vanished in a continuously changing world. If services shall be successful in the future, they have to take data sovereignty of their users/consumers into account. Being decentrally organized, local operation (in personalized devices such as smart-phones, smart home servers, PC and others we currently do not even dream of), anonymity, and resilience are their immanent characteristics.

    "Do Not Put All Your Eggs into One Basket"...

    ...an ancient proverb, which is fully applicable to Digital Sovereignty. If we want to become sovereign of our data again, we have to replace the currently predominant approach based on centrally managed data and the accumulation of a person’s information items in one place.

  • Digital Sovereignty - Participate! Contribute!

    The ”Greenbook Digital Platforms (Grünbuch Digitale Plattformen)”, published by the German government in May 2016, is a clear proof that digital sovereignty is recognized as a necessary requirement for a successful digital transformation in Germany and Europe. Important issues with particular reference to the use of data, their economic value and the protection of individual users’ rights are explicitly addressed, looking for solution proposals. A call for action is sent to the public (see https://gruenbuch.de.digital/de/kommentieren/ to contribute and participate actively in the ongoing discussion).Resulting recommendations for follow-up actions are planned for 2017.

  • European Cyber Security Conference March 2016 (Summary)

    Cebit 2016 - Cyber Security Konferenz

    Conference Summary: GIC@CeBIT 2016
    European Cyber Security Conference at CeBIT 2016

    Organized by the Global Industry Club GIC, March 14, 2016, Hannover, Germany

    „Cyber Security is a societal debate“ or „The glass is always half full…“

    The multi-facets of cyber security became obvious during the first day of CeBIT 2016 in Hannover, Germany during the well attended European Cyber Security Conference, organized by the Global Industry Club. The participants could listen to five high-profile keynote presentations and contribute during four parallel workshops. A lively podium finalized the event. Gabriele Rittinghaus, the event initiator, was very satisfied with the results: “Being present on the first day of CeBIT with such an important topic is a huge opportunity and obligation at the same time.”

  • Data Protection: THE Business Driver for New Apps and Services

    Digital Sovereignty 1.1 - Data Protection is THE Business Driver for New Apps and Services

    The next wave of app(lications) and Internet services will be successful because of data protection!

    In Search of the Killer App

    The fight for customers and market share in the digital economy is tough. The first mover advantage seems to be most important due to the relatively simple internationalization of Internet services. Well known examples are Google, Amazon, and Facebook. Very often, the market leader offers maximum functionality which is easy to use. Other qualities of the offerings such as security, data protection, Digital Sovereignty are treated only as second in line. In the best case they are perceived as unnecessary, in the worst case, they are seen as detrimental and “killing business”.

  • Whom Can I Trust With Money?

    At CES 2016 in Las Vegas we could see a number of new offerings around payment systems. They are all based on Internet technologies and mostly use one or more smartphone features and apps. But what about alternatives which are convenient and secure and even anonymous?

  • The Right Internet Technologies for Our Health System

    Big data and Internet technologies are expected to play an important role for the implementation of a human and affordable health system. However, humans have to be in focus when designing the technology and its use. A decentralized approach and digital sovereignty of users are decisive qualities of the planned technology investments. We are all responsible for requesting and promoting these design criteria for the use of Internet technologies in our health system.

  • ISAS Events (International Service Availability Symposium)

    ISAS, the International Service Availability Symposium, was a sequence of 5 events bringing together researchers and practitioners to discuss the availability aspects in services. The term services is kept relatively vague on purpose. This helped the ISAS conference to address a wide set of service areas including maintenance, Web services, xaaS (software, applications, infrastructure As A Service) and other  service aspects around information (and communication) technologies.

  • ISAS 2008 Report

    ISAS 2008, the 5th in the series of ISAS Events (International Service Availability Symposium), was hosted by Prof. Takashi Nanya at the Research Center for Advanced Science and Technology (RCAST), University of Tokyo in May 2008. Close to 80 participants from industry and academia showed the importance of the conference, which celebrated its 5th anniversary.

  • Digital User Rights - more than a game

    Think about it - the Internet has grown from a tool of a bunch of nerds into a world-wide available infrastructure, which is used by billions of people, on a professional as well as on personel level.

    For each item in the real world, we all profit from a legal framework which allows us to move (more or less) safely about. But what about the digital world? To me this looks much more like Wild West than anything else. In many ways we depend upon the goodwill of international players who confront us with usage regulations 20 pages long before allowing us to use our smartphone which we have paid for!

  • ENISA - European Network and Information Security Agency

    The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European Member States and European institutions in network and information security, giving advice and recommendations and acting as a switchboard of information for good practices. Moreover, the agency facilitates contacts between the European institutions, the Member States and private business and industry actors.

  • IEEE Dependability

    Sponsored by the IEEE Computer Society's Technical Committee on Dependable Computing and Fault-Tolerance and IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, Dependability.org has been created as a central source on the Web for information on dependable systems technology. 

  • GI Security Division

    The Security - Protection and Reliability division (Fachbereich Sicherheit - Schutz und Zuverlässigkeit) of the German Computer Society (Gesellschaft für Informatik GI) acts as a forum for all specialists active on topics of security, safety, dependability (reliability, availability). Special interest groups (SIGs) support scientific work as well as the exchange of ideas between science and industry. The cross-over characteristic of security topics is reflected in the divisional organization providing the basis for cross-functional work-groups, conferences and other joint activities between the SIGs, but also with other divisions, industrial partners and society in general.

    Manfred was founding member of the division, which started in 2001, and was its elected speaker 2001 - 2006.

  • SAForum - Service Availability Forum

    The Service Availability Forum™ is a consortium of industry-leading communications and computing companies working together to develop and publish high availability and management software interface specifications.  The SA Forum then promotes and facilitates specification adoption by the industry.

    Manfred was elected president in 2004 and supported the Forum work in a number of roles (business model, use model, board member etc) over the years.

  • Amber Project

    The AMBER Project aimed to coordinate the study of resilience measuring and benchmarking in computer systems and components, fostering European research in order to address the big challenges on resilience assessment posed by current and forthcoming computer systems and computer-based infrastructures.

    Manfred was a member of the AMBER advisory board.

  • BSI- Federal Office for Information Security

    The Federal Office for Information Security (BSI) is the central IT security service provider for the German government. By its basic research within the area of IT security it takes responsibility for the security of our society, and is thus indispensable to the internal security of Germany.