{"id":779,"date":"2010-01-29T15:51:44","date_gmt":"2010-01-29T22:51:44","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cqtwo\/?p=779"},"modified":"2010-02-04T11:19:43","modified_gmt":"2010-02-04T18:19:43","slug":"soracle-waveset","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/2010\/01\/29\/soracle-waveset\/","title":{"rendered":"Soracle Waveset"},"content":{"rendered":"<p>Pamela Dingle from <a title=\"Ping Identity\" href=\"http:\/\/www.pingidentity.com\/\">Ping Identity<\/a> has an <a title=\"Oracle's IDM plans\" href=\"http:\/\/eternallyoptimistic.com\/2010\/01\/29\/oracle-waveset\/\">insightful post<\/a> on the identity implications of the newly-approved Oracle acquisition of Sun.<\/p>\n<p>Both companies have identity management businesses but I doubt that these were key to the acquisition.  Regardless; in the identity community, everyone&#8217;s been waiting to see what Oracle&#8217;s roadmap would look like for their collection of identity management products.<\/p>\n<p><!--more-->Sun&#8217;s identity software was based on the LDAP directory originally developed by Netscape, plus the management software from their 2003 acquisition of Waveset; the Waveset management team then ran the identity business, in large part, at Sun, although they&#8217;ve long since left.  Oracle is a much newer entrant into the identity management business, although they&#8217;re automatically on any short list now given their size and penetration in the enterprise marketplace; any company looking at deploying identity management already is running lots of Oracle software (including PeopleSoft, which typically serves as a key store of employee identity in large enterprises).  Oracle&#8217;s identity solutions have been created via acquisition so even before the Sun acquisition they were dealing with a real hodgepodge of technologies.  In addition to their own in-house identity software, four or five years ago they went on a buying binge and acquired Thor, Oblix, OctetString, Bridgestream, Phaos, and others.<\/p>\n<p>Dingle writes:<\/p>\n<blockquote><p>The dust has settled on the initial announcements, and the big surprise is that OIM (previously Thor) has been chosen as the strategic provisioning product.\u00a0 I can see all sorts of technical reasons why this might be the case \u2013 I imagine that the original Thor product had already been heavily retooled for integration into the fusion middleware suite.<\/p><\/blockquote>\n<p>Interestingly, Oracle has chosen to use the Waveset name, which had disappeared from Sun&#8217;s catalog ages ago, acknowledging the staying power of that brand.\u00a0 Of course, it doesn&#8217;t do the existing Sun (sorry, Waveset) identity customers much good, because they&#8217;re the accidental victims of this acquisition &#8212; Oracle doesn&#8217;t even have a migration plan for them yet.<\/p>\n<p>(In related news, see Michael Meeks&#8217; <a title=\"Michael Meeks on Open Office at Soracle\" href=\"http:\/\/www.gnome.org\/~michael\/blog\/2010-01-27.html\">post<\/a> on the implications of Soracle on OpenOffice.)<\/p>\n<p>More <a title=\"Identity management postings\" href=\"http:\/\/blogs.law.harvard.edu\/cqtwo\/category\/identity\/\">identity postings<\/a>&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pamela Dingle from Ping Identity has an insightful post on the identity implications of the newly-approved Oracle acquisition of Sun. Both companies have identity management businesses but I doubt that these were key to the acquisition. Regardless; in the identity &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/cqtwo\/2010\/01\/29\/soracle-waveset\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1116,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[117],"tags":[],"class_list":["post-779","post","type-post","status-publish","format-standard","hentry","category-identity"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8jQA6-cz","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/posts\/779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/users\/1116"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/comments?post=779"}],"version-history":[{"count":7,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/posts\/779\/revisions"}],"predecessor-version":[{"id":806,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/posts\/779\/revisions\/806"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/media?parent=779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/categories?post=779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cqtwo\/wp-json\/wp\/v2\/tags?post=779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}