All that JAAS
Scalable Java security with JAAS Have you ever needed to create a login authentication mechanism for an application? Odds are, you have, and probably more than once, with each new implementation being close, but not identical, to the previous one.…
Back in the XML soup
XPath and XSLT power document-oriented Web services At the XML Web Services One conference in Boston last month, I spent most of my allotted time in an all-day W3C/OASIS seminar on Web services security. But I couldn’t help ducking out…
What, if anything, do we owe our employers?
‘Doing your best’ may not be enough Most people, and employers in particular, like to think that employees owe something to the people who sign the checks, but just what is it that we owe our employers ethically? Many people,…
E-biz tech review: An adapter for every outlet worldwide
No need to carry bulky array for power conversion Don’t be tempted to buy one of those bulky bags of adapters that supposedly fit your laptop’s power plug into the outlets of every country in the world. A much better…
Qualys is proactive about network security
VP Gerhard Eschelbeck discusses the company’s ASP model for protecting against intruders ASSESSING A COMPANY’S networks for vulnerabilities is a key part of the overall security market. Qualys’ QualysGuardWeb service provides an ongoing picture of network exposures to help administrators…
Macromedia MX developer kit released
MACROMEDIA ON FRIDAY announced availability of its Macromedia MX Developer Resource Kit, Volume One. The kit features extensions, components, and resources to enable Macromedia Flash MX, Dreamweaver MX, and ColdFusion MX developers to more quickly develop rich Internet applications, the…
Inside Corona: Microsoft improves usability and control
Unless you’re in the digital media business, you might not realize how much Microsoft has invested in Windows’ integrated media technologies. Virtually all modern Windows PCs can play back smooth, high-resolution digital video with synchronized sound. For Windows Media 9…
Without a safety .Net (Second in a four-part series)
Will CTOs follow Microsoft’s .Net strategy? Read results from InfoWorld’s CTO Network Survey in part two of a four-part series Many CTOs are taking a cautious approach to their plans to roll out .Net. Source: www.infoworld.com
Wireless’ flexibility earns praise
Technology?s usefulness garners attention, but security concerns remain up in the air TWELVE MONTHS AFTER the attacks that left the Pentagon and New York’s financial district in rubble, organizations both private and public are still sorting out how to assess…
Link free or die
Some readers suggest reports of Notes’ death may be greatly exaggerated, but save the obituary just in case See correction below REMEMBER THE browser wars? Weren’t they something — a titanic struggle for control of the Internet operating system. Now…