archivesWhat’s Real User Monitoring, anyway?Submitted by Alistair Croll on August 15, 2006 - 1:00am.
Title: VP Product Management, Co-Founder Company: Coradiant
We use the term Real User Monitoring to explain what Coradiant’s technology does. The term sounds a bit nebulous, but it does the job. Of course, there are lots of people who think they do real user monitoring; so I’m going to try and explain the differences between us and some of the distinctions.Synthetic testsFirst [...]
read more
( Related: Data Management | performance theory | technology | webops )
Sun and Open Source Java versus the Microsoft .NET EffortsSubmitted by Stephen Walli on August 15, 2006 - 2:33am.
Title: VP, Open Source Development Strategy Company: Optaros
I attended the small event Sun hosted this evening to talk about the next steps towards an open source Java world. On hand for the discussion were Sun Software EVP Rich Green, VP of Developer Programs and Products Laurie Tolman,...
read more
( Related: Enterprise Applications )
Stealing Credit Card Information off Phone LinesSubmitted by Bruce Schneier on August 15, 2006 - 8:19am.
Title: Founder and Chief Technical Officer Company: Counterpane Here's a sophisticated credit card fraud ring that intercepted credit card authorization calls in Phuket, Thailand. The fraudsters loaded this data onto MP3 players, which they sent to accomplices in neighbouring Malaysia. Cloned credit cards were manufactured in Malaysia and sent back to Thailand, where they were used to fraudulently purchase goods and services.It's 2006 and those merchant terminals still don't encrypt their communications? ( Related: it security )
ITIL WorshipSubmitted by Tom Bishop on August 15, 2006 - 12:09pm.
Title: CTO Company: BMC There is a lot of “ITIL® talk” and buzz about Business Service Management (BSM) on conference calls and in boardrooms these days. It’s not like the dot-com bubble. This is real. But what are the CIO and their teams doing about it? They should be asking “What do we need to do to get the full value from our Business Service Management initiatives? How do we streamline, link and optimize our IT and business functions?” read more
( Related: bsm | change management | cio | cmdb | forrester | IT Management | itil | problem management | release management )
hax0rs vs. Ivory Tower (vs demoscene ;-)Submitted by Dug Song on August 15, 2006 - 12:19pm.
Title: Chief Security Architect Company: Arbor Networks
USENIX security and Blackhat collided for the first time this year.While the rest of my coworkers bounced between parties^H^H^H^H presentations in Vegas, I sat in a Vancouver hotel room reviewing papers with a program committee between talks. The divide between those who break and those who build was never starker - with the exception of [...]
read more
( Related: arbor networks | events | interesting research | Security )
How to win 50,000 euros by compressing humanknowledgeSubmitted by Kingsley Idehen on August 15, 2006 - 1:07pm.
Title: Founder & CEO Company: OpenLink Software How to win 50,000 euros by compressing humanknowledge: " Move over Turing Test. Stepback LoebnerPrize. The latest proposal for a simple test for machineintelligence is the HutterPrize for Lossless Compression of Human Knowledge. read more
( Related: Software Development )
The Value of Being GreenSubmitted by Jonathan Schwartz on August 15, 2006 - 1:10pm.
Title: Executive Vice President, Software Group Company: Sun Microsystems
I was at Craigslist recently, and heard they were being kicked out of a hosting facility for being widly popular - in order to serve a massively expanding user base, their growing infrastructure was requiring more electricity than the facility could supply.
read more
( Related: general | IT Management )
Review of U.S. Customs and Border Patrol Anti-Terrorist ActionsSubmitted by Bruce Schneier on August 15, 2006 - 3:19pm.
Title: Founder and Chief Technical Officer Company: Counterpane Department of Homeland Security, Office of the Inspector General, "Review of CBP Actions Taken to Intercept Suspected Terrorists at U.S. Ports of Entry," OIG-06-43, June 2006. read more
( Related: it security )
|
NewsletterGet these headlines/links in a daily e-mail newsletter. AdvertisementSponsored LinksPopular Topicschannels and content
Data Management
Enterprise Applications
IT Management
it security
Knowledge Management
Networking
Platforms
Security
Software Development
Storage
what's new
Recent Blog Entries
User login
NavigationBrowse archives
|