• Whitebook Digital Platforms - a Step in the Right Direction

    The German Government is evolving its strategy on digital platforms, as we had already reported earlier (Digital Sovereignty - Participate! Contribute!, Whitebook Digital Platforms in the Makes). The expected White Paper has been published in March 2017. In4com.de has reviewed the paper and summarized the most important results with respect to digital sovereignty being at the core of in4com.de agenda. The civil society has to stay alert due whitepaper shortcomings. Also, ongoing international trade negotiations may have huge negative impacts on privacy and digital sovereignty (in4com.de has commented on this).

  • TiSA Foils EU Data Protection Directive

    STOP TTIP association logo

    2016 Leaks from the TiSA negotiations held in secrecy (Trade in Services Agreement) indicate that TiSA will foil the EU data protection directive of early 2016. TiSA must come under public monitoring and requires an eventual public vote!

  • Hidenets Project

    HIDENETS Highly Dependable IP Based Networks and Services

    The aim of the HIDENETS project (Highly Dependable IP Based Networks and Services, click here for a summary) was to develop and analyze end-to-end resilience solutions for distributed applications and mobility-aware services in ubiquitous communication scenarios. Technical solutions have been developed for applications with critical dependability requirements in the context of selected use-cases of ad-hoc car-to-car communication with infrastructure service support.

  • Whitebook Digital Platforms in the Makes

    Manfred Reitenspiess, owner of in4com.de, has provided extensive comments on the greenbook „Digital Platforms“ (Grünbuch „Digitale Plattformen“) as published by the German Government (we had pointed out the opportunity to contribute in „Digital Sovereignty - Participate! Contribute!). The received comments were summarised by the German Ministry of Economy and Energy BMWE. In4com.de comments were cited a number of times and are completely available for download. In a follow-up step (beginning of 2017) a whitebook is to be published as a step toward a German digital agenda. The whitebook shall come up with specific recommendations and calls for action with respect to the evolution of digital platforms (see the official webpages of the BMWE).

  • [Monitored] Mobility – a Safe and Secure Experience!?

    Digital Sovereignty 2.1 - Mobility Services

    It is no longer a question, but a fact that the Internet is in the car. After discussing a number of useful mobile services in passenger cars, we have to conclude that our digital sovereignty will be lost if we do not take adequate measures

  • Secure Internet Services - more on their design

    Digital Sovereignty 1.4 - More architecture charactistics of secure Internet services

    We have already shown in Architectures for Secure Internet Services,  how decentralization, anonymity, and resilience can help to assure digital sovereignty (the what and why is discussed in more detail in"Digital Sovereignty - What is it?", "Digital Sovereignty – why we need it", "Giving up Digital Sovereignty?"). In this report we will introduce two more foundational and necessary architecture principles – object orientation and  need-to-know principle.

    Real World Role Model Offset in the Digital World

    Living together in our society as well as the functioning of a corporation depend on a clear role model and people acting according to a given role at a certain point in time. A number of roles are assigned to each of us, depending upon the environment in which we are acting: mother, pilot, chancellor, software programmer, trucker,…

  • Secure Internet Services - how to design them

    Digital Sovereignty 1.3 - Architectures for Secure Internet Services

    Today’s data center focused and organized Internet services are just like dinosaurs – they were very successful at their time, but eventually vanished in a continuously changing world. If services shall be successful in the future, they have to take data sovereignty of their users/consumers into account. Being decentrally organized, local operation (in personalized devices such as smart-phones, smart home servers, PC and others we currently do not even dream of), anonymity, and resilience are their immanent characteristics.

    "Do Not Put All Your Eggs into One Basket"...

    ...an ancient proverb, which is fully applicable to Digital Sovereignty. If we want to become sovereign of our data again, we have to replace the currently predominant approach based on centrally managed data and the accumulation of a person’s information items in one place.

  • Digital Sovereignty - Participate! Contribute!

    The ”Greenbook Digital Platforms (Grünbuch Digitale Plattformen)”, published by the German government in May 2016, is a clear proof that digital sovereignty is recognized as a necessary requirement for a successful digital transformation in Germany and Europe. Important issues with particular reference to the use of data, their economic value and the protection of individual users’ rights are explicitly addressed, looking for solution proposals. A call for action is sent to the public (see https://gruenbuch.de.digital/de/kommentieren/ to contribute and participate actively in the ongoing discussion).Resulting recommendations for follow-up actions are planned for 2017.

  • Digital Sovereignty in German Digital Strategy 2025

    Digital Sovereignty is in the list of topics of Germany’s Digital Strategy 2025 … however, more implementation details are required.

    Update 2016-06-08: Digital Sovereignty comes in focus on de.digital (in German), see also "Digital Sovereignty - Participate! Contribute!"

  • Pro Democracy - Against Techno-Feudalism

    The growing powers and influence of Internet monopolies during the ongoing digital transformation threatens democratic societies - WE HAVE TO ACT.

  • European Cyber Security Conference March 2016 (Summary)

    Cebit 2016 - Cyber Security Konferenz

    Conference Summary: GIC@CeBIT 2016
    European Cyber Security Conference at CeBIT 2016

    Organized by the Global Industry Club GIC, March 14, 2016, Hannover, Germany

    „Cyber Security is a societal debate“ or „The glass is always half full…“

    The multi-facets of cyber security became obvious during the first day of CeBIT 2016 in Hannover, Germany during the well attended European Cyber Security Conference, organized by the Global Industry Club. The participants could listen to five high-profile keynote presentations and contribute during four parallel workshops. A lively podium finalized the event. Gabriele Rittinghaus, the event initiator, was very satisfied with the results: “Being present on the first day of CeBIT with such an important topic is a huge opportunity and obligation at the same time.”

  • Digital Sovereignty - Why Do We Give It Up?

    Data required for a virus can?

    It is so easy - everything is for free, just check out the Internet! Click on a free App, download the App, install and run. One can find Apps for nearly everything. And for even the simplest pieces of information you give away whatever is stored about you on your phone. The image shows a quick example what you open up when installing a virus scan tool (I have checked at least 5 of them and only one out of 5 had a reduced set of requirements).

  • Digital Transformation is Based on Digital Sovereignty

    Digital Sovereignty 1.2 - Digital Transformation is Based on Data Sovereignty

    In the course of the ongoing digital transformation data owners will become part of the value chain - our data are valuable - we have to charge for their use!

    Data are Entering Blue and White Collar Work

    Digital transformation processes, as we know them from the first Internet hype in the year 2000, are entering more and more areas of our society. You find them in the ongoing industrial automation (Industry 4.0), automated driving of cars (autonomous vehicles) and the overall influence of information technology (IT) on mobility (integrated traffic management), or the automation of energy production and its distribution in the optimization of energy use.

  • Data Protection: THE Business Driver for New Apps and Services

    Digital Sovereignty 1.1 - Data Protection is THE Business Driver for New Apps and Services

    The next wave of app(lications) and Internet services will be successful because of data protection!

    In Search of the Killer App

    The fight for customers and market share in the digital economy is tough. The first mover advantage seems to be most important due to the relatively simple internationalization of Internet services. Well known examples are Google, Amazon, and Facebook. Very often, the market leader offers maximum functionality which is easy to use. Other qualities of the offerings such as security, data protection, Digital Sovereignty are treated only as second in line. In the best case they are perceived as unnecessary, in the worst case, they are seen as detrimental and “killing business”.

  • Be On Alert!

    Our digital sovereignty is jeopardized by potential monopolies of big Internet companies such as Google and Apple.

    (SZ: Johannes Kuhn: Letzte Ausfahrt Zukunft/Last Exit: the Future; in German: SZ #11, 2016-01-15; URL: http://www.sueddeutsche.de/digital/mozilla-letzte-ausfahrt-zukunft-1.2818241, accessed on 2016-01-16, 11:01 UTC)

  • Whom Can I Trust With Money?

    At CES 2016 in Las Vegas we could see a number of new offerings around payment systems. They are all based on Internet technologies and mostly use one or more smartphone features and apps. But what about alternatives which are convenient and secure and even anonymous?

  • The Right Internet Technologies for Our Health System

    Big data and Internet technologies are expected to play an important role for the implementation of a human and affordable health system. However, humans have to be in focus when designing the technology and its use. A decentralized approach and digital sovereignty of users are decisive qualities of the planned technology investments. We are all responsible for requesting and promoting these design criteria for the use of Internet technologies in our health system.

  • ISAS Events (International Service Availability Symposium)

    ISAS, the International Service Availability Symposium, was a sequence of 5 events bringing together researchers and practitioners to discuss the availability aspects in services. The term services is kept relatively vague on purpose. This helped the ISAS conference to address a wide set of service areas including maintenance, Web services, xaaS (software, applications, infrastructure As A Service) and other  service aspects around information (and communication) technologies.

  • ISAS 2008 Report

    ISAS 2008, the 5th in the series of ISAS Events (International Service Availability Symposium), was hosted by Prof. Takashi Nanya at the Research Center for Advanced Science and Technology (RCAST), University of Tokyo in May 2008. Close to 80 participants from industry and academia showed the importance of the conference, which celebrated its 5th anniversary.

  • Digital Civil Rights and Data Sovereignty in in4com Focus

    in4comstands for "Industrial Integration In Information and Communications" - the notion dates back to the turn of the century when 3G was widely introduced, UMTS blinked on the horizon, and a tremendous hype around communications and the integration with information technologies started off. As we know now, this was just the initial hype of many more which followed.  The need for an industrial approach to the use of IT and communications has never been bigger than today - we assume in 10 years from now this will still be true.

  • Digital User Rights - more than a game

    Think about it - the Internet has grown from a tool of a bunch of nerds into a world-wide available infrastructure, which is used by billions of people, on a professional as well as on personel level.

    For each item in the real world, we all profit from a legal framework which allows us to move (more or less) safely about. But what about the digital world? To me this looks much more like Wild West than anything else. In many ways we depend upon the goodwill of international players who confront us with usage regulations 20 pages long before allowing us to use our smartphone which we have paid for!

  • Digital Sovereignty - What is it?

    Digital sovereignty denotes the authority of individuals over their presence and representations in the digital world.

     The definition of digital sovereinty is relatively flurry due to its varying meanings. So for this brief discussion, we have searched for both: digital sovereignty and data sovereignty. What we found was that the terms' interpretations take mainly a governmental view based on definitions for "sovereignty" (different from the terms' use in Germany as discussed in Digitale Souveränität - Was ist das?).

  • Digital Sovereignty – why we need it

    Our digital alter ego  is abundant - and we better take care of it. The concept  of digital sovereignty should help us to manage it.

    Each and every one of us has a digital alter ego. But who of us knows, where this alter ego is stored? Even more relevant: which attributes are associated with our alter ego? Or: who is making money from knowing or using our alter ego? May be only partially or in combination with other data? Digital sovereignty – the management or control of our alter ego in the digital world – should help us answer above questions when managing our digital alter ego.

  • ENISA - European Network and Information Security Agency

    The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European Member States and European institutions in network and information security, giving advice and recommendations and acting as a switchboard of information for good practices. Moreover, the agency facilitates contacts between the European institutions, the Member States and private business and industry actors.

  • IEEE Dependability

    Sponsored by the IEEE Computer Society's Technical Committee on Dependable Computing and Fault-Tolerance and IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance, Dependability.org has been created as a central source on the Web for information on dependable systems technology. 

  • GI Security Division

    The Security - Protection and Reliability division (Fachbereich Sicherheit - Schutz und Zuverlässigkeit) of the German Computer Society (Gesellschaft für Informatik GI) acts as a forum for all specialists active on topics of security, safety, dependability (reliability, availability). Special interest groups (SIGs) support scientific work as well as the exchange of ideas between science and industry. The cross-over characteristic of security topics is reflected in the divisional organization providing the basis for cross-functional work-groups, conferences and other joint activities between the SIGs, but also with other divisions, industrial partners and society in general.

    Manfred was founding member of the division, which started in 2001, and was its elected speaker 2001 - 2006.

  • SAForum - Service Availability Forum

    The Service Availability Forum™ is a consortium of industry-leading communications and computing companies working together to develop and publish high availability and management software interface specifications.  The SA Forum then promotes and facilitates specification adoption by the industry.

    Manfred was elected president in 2004 and supported the Forum work in a number of roles (business model, use model, board member etc) over the years.

  • Amber Project

    The AMBER Project aimed to coordinate the study of resilience measuring and benchmarking in computer systems and components, fostering European research in order to address the big challenges on resilience assessment posed by current and forthcoming computer systems and computer-based infrastructures.

    Manfred was a member of the AMBER advisory board.

  • BSI- Federal Office for Information Security

    The Federal Office for Information Security (BSI) is the central IT security service provider for the German government. By its basic research within the area of IT security it takes responsibility for the security of our society, and is thus indispensable to the internal security of Germany.