It begins when management realizes that a systemic problem exists in the software they are developing, usually security, performance or reliability (SPR) related. Management gets worried and decides to bring in an expert, a guru who is to fix the problem.
Everything about technology but product reviews
Why TLS doesn't replace VPN for Enterprise customers
If you can establish a TLS connection to your enterprise remotely. then why do you need VPN/IPSEC? Given that any TCP based protocol can be run over TLS it would seem that the ubiquitous support for TLS has solved our remote access end-to-end security problems.
UPnP Security Flaws
When I heard that UPnP, a sub system of Windows XP I helped to architect when I had worked at Microsoft in the 1990s, had a major security hole you can imagine I was more than a little curious. So I decided to investigate. Read More
Yaron's WebDAV Agenda
The purpose of this document is to provide a quick introduction to the full power of the WebDAV (http://www.webdav.org) data model.
Multi-Protocol Support – or – Yes, there is more than just HTTP
There will not be one protocol to rule them all.
Read More