HomeDevelopment

Development

UK town a global contender in bot battle

If you told residents of Winsford, England, that their personal computers had been turned into an invisible electronic army, they'd probably think you're mad. But the 33,000-person town in northwest part of the country reportedly has one of the highest rates of computers infected with programs that receive and respond to commands from other remote computers.

Web apps new target for attacks, says report

Attackers have found a new vehicle for launching attacks targeting client-based computer systems, and traditional network defenses are no longer sufficient to protect against these breaches, a recent security report said. According to the latest Internet Security Threat Report from Cupertino, Calif.-based Symantec Corp., over half of the attacks reported over the past six months infected Web application technologies. Seventy four per cent of these attacks involved exposure of confidential information such as keystroke logging software and Trojans.

OASIS drafts blueprints for SOA

SOA presents a paradox: turning applications into platform-agnostic services is a great way to reduce redundancy and accelerate integration, but where can you turn for architectural guidance that avoids the vendor lock-in that SOA is supposed to prevent in the first place?

Adapting to SOA

As part of its two-year-old effort to move legacy mainframe systems to a service-oriented architecture (SOA), Sabre Holdings Corp. in May began dispatching

Starwood nears end of SOA revamp

Every major enterprise applications vendor has hopped on the SOA (services-oriented architecture) bandwagon and extolled the virtues of using standards-compliant software to expose business processes as Web services, reducing the pain of integrating heterogeneous systems. But for customers, implementing an SOA environment in their own data centres can be a complex and lengthy process. One chief technology officer nearing the end of a five-year SOA project says the results, though a long time coming, are worth it.

Development tool security hole threatens Internet apps

A security hole in a popular development tool has severe implications for a number of the Internet

Web sites with better branding

Web sites can be a key marketing tool for almost every type of business. But too many companies have lost sight of the fundamental...

Attacked bank extends defences to customers

In the face of smarter and more sophisticated criminal attacks, Standard Bank of South Africa is ramping up its efforts to protect its customers.

Popular Posts

Development Videos

Development Downloads

Development Blogs

What are the benefits and risks of software engineering intelligence platforms?

Software engineering intelligence (SEI) platforms provide software engineering leaders and teams with insights into what engineering data is really saying about how software products...

Slideshows

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few years. Business leaders across the country have had to address hybrid work, with many...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders and is key to keeping pace with today’s market. Fortunately, there has never been...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and brands – is a frictionless interaction perceived by your customers as simple and...

Long Distance Advantage: An Outsourcing Case Study

Ricoh is a global information management and digital services company. For more than 85 years Ricoh technology, creativity, and expertise has helped businesses around...