What are Web services anyway?

The amorphous term “Web services” has a lot of people confused. What exactly does it mean? Here’s one explanation that should help you sort it out and decide how to put Web services to use for your organization.

Mark Scureman

Most people don’t listen with the intent to understand. They listen with the intent to reply. They filter everything through their own paradigm and experiences, so that what they hear may not be what you said.

Understanding how 10/100Base-T Ethernet operates

“Since the late 1990s, 10/100Base-T Ethernet (also known as IEEE 802.3 and CSMA/CD) has become the de facto standard for local area networks. We’re going to look at the elements involved in using Ethernet in a 10/100Base-T network, including the components of a frame, how Ethernet technology functions, and where this suite of technologies fits into the OSI reference model.”

Identifying the 10 Most Common Application-level Hacker Attacks

E-mail viruses and worms get more press, but Web application security can be a bigger problem for many firms. Most sites have flaws that hackers can use to cause trouble. Take a fresh look at your site after reading about these application security holes.

Management service providers: Ready for prime time?

The MSP Association defines a management service provider (MSP) as “a company that delivers information technology infrastructure management services over a network to multiple customers on a subscription basis.” Before the Internet became a commodity, organizations leased private networks from major communication service providers that managed those networks for a fee. In recent years, many organizations, such as hospitals, universities, and other businesses—small, medium, and … [ Read more ]

Rethinking the IT domain: When PDAs, phones go online

These days, many employees use either a PDA or cell phone for both personal and work-related purposes. This article provides advice on how to bring order, control costs, protect company data, and maintain support with multiple computing devices.

Protect your network with an Intrusion Detection System

According to research by the International Computer Security Association, in 1998, at least one computer attack or break-in occurred every second. Back in the good old days of the Internet, firewalls were an afterthought. But today, they’re basic equipment. The problem is, they’re not enough, according to a January Gartner report titled “Intrusion Detection System (IDS): Perspective.”

“Many organizations believe that since they have firewalls … [ Read more ]

How does the waterfall development methodology play in the enterprise?

Sure, you’ve heard of the waterfall development methodology and have probably used it (whether you knew it or not). But how is it used at the enterprise level? Here’s a look at the process, typical deliverables, and what to expect from each step.

In depth: Protect your data with these security measures

A network is never entirely safe from snoops and spies, but new technology such as wireless networks is making security even more difficult. This report from Auerbach Publications offers a plan of attack.