• Users rethink Amazon S3 after performance issues

    Web 2.0 companies say the storage service from Amazon is cheap and easy to use, but needs performance enhancement and better reliability if it wants to attract big companies.

    ITKE346,360 pointsBadges:
  • Warning — your IT shop needs a makeover

    SharePoint, cloud computing and other Web 2.0 technologies promise to keep IT managers on their toes. You'll have to adapt to stay out of the tar pits.

    Margie Semilof4,245 pointsBadges:
  • How to get management on board with Web 2.0 security issues

    Ways to get management buy-in for Web 2.0 security testing and quality assurance and to bolster application security before deployment are given in this tip. Test pro Kevin Beaver explains why Web 2.0 initiatives are often difficult to explain to software managers.

    Kevin Beaver17,140 pointsBadges:
  • Rich Internet applications security testing checklist

    Fix common RIA and Web 2.0 application problems typically caused by Ajax, Flash and other technologies with these tips. Software expert Kevin Beaver explains why add-ons, plug-ins and multimedia features are causing more security flaws.

    Kevin Beaver17,140 pointsBadges:
  • 2006 outlook: Open source, offshoring, Web 2.0

    Former TechTarget editor-in-chief Paul Gillin predicts the top 10 technology trends for 2006, including open source, Web 2.0, blogging, offshoring and convergence.

    SearchCIOMidmarket9,485 pointsBadges:
  • 2006 outlook: Open source, offshoring, Web 2.0

    Former TechTarget editor-in-chief Paul Gillin predicts the top 10 technology trends for 2006, including open source, Web 2.0, blogging, offshoring and convergence.

    SearchCIOMidmarket9,485 pointsBadges:
  • New attack methods target Web 2.0, VoIP

    Researchers have found new evidence that attackers are targeting Web 2.0 applications and VoIP with increased vigor. Companies are ill-prepared to meet the threat, they say.

    SearchCIOMidmarket9,485 pointsBadges:
  • Report warns of critical flaw in Web 2.0, AJAX

    Fortify Software warns in a new report that digital outlaws could use JavaScript to snatch data from Web 2.0 and AJAX-based applications if they're not properly secured.

    SearchCIOMidmarket9,485 pointsBadges:
  • WebSense: PortAuthority deal, Web 2.0 apps reflect changing threat landscape

    Websense's December acquisition of PortAuthority marries ingress and egress detection capabilities, giving the vendor a foothold in defending not only Web threats, but sensitive customer data and intellectual property leaving the network perimeter. CEO Gene Hodges, former McAfee president, delivers...

    MMimoso3,355 pointsBadges:
  • Web 2.0 and e-discovery: Risks and countermeasures

    Enterprise employees often love Web 2.0 services like wikis and social networking services, but the data employees may create with or provide to those services can put an enterprise at risk, especially when litigation calls for electronic discovery of that data. Michael Cobb offers detailed risk...

    SearchCloudSecurity2,620 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following