March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
September 16, 2014
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
April 24, 2013
Users and analysts at Inforum 2013 were impressed with its XML-based ION middleware, but wondered if Infor is pushing out apps fast enough.
January 22, 2002
More than any recent technology, Web services are surrounded by hype, mystery, and a bit of mumbo jumbo thrown in for good measure. Does anyone really know what they are or how they work? Find out how Web services really work.
XML Get Started
Bring yourself up to speed with our introductory content
As admins get comfortable with learning PowerShell, questions come up about what tasks it automates to free up time. We answer some of those here. Continue Reading
A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device. Continue Reading
WS-Security and XML encryption are two essential elements of Web services security. In this XML encryption and WS-Security tutorial, which is a part of the SearchSecurity.com XML Web services tutorial, learn more about the security threats and concerns that WS-Security addresses, as well as the importance of WS-Security and the differences between WS-Security and SSL. Continue Reading
Evaluate XML Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Nick Lewis breaks down the evolution of the STIX framework and how it can be used to improve security threat intelligence. Continue Reading
While iOS configuration profiles may not be a long term device management answer, for now they provide IT plenty of utility when managing Apple devices. Continue Reading
Administrators need to be careful when connecting Windows 8.1 endpoints to enterprise domains. Windows 8 Group Policy and Active Directory can help. Continue Reading
Learn to apply best practices and optimize your operations.
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the risks. Continue Reading
When designing APIs, developers must make good decisions about security design components that show who's using what API, when and for what purpose. This tip offers insights into the critical components for securing APIs. Continue Reading
Vendors can reduce potential issues by packaging VMs into a virtual appliance for customers. Here's how to create and modify the resulting OVF file. Continue Reading
Problem Solve XML Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 8 lacked a way to enforce a consistent user experience, but thanks to PowerShell, you can provide a common Windows 8.1 Start screen. Continue Reading
When choosing between REST or SOAP for mobile apps, it's important to remember there are two major models: native and wrapped mobile web applications. Continue Reading
Read this tip from Basit Farooq to learn which time-saving and job-improving SQL Server 2012 management tools you need to know about. Continue Reading