March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
September 16, 2014
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
April 24, 2013
Users and analysts at Inforum 2013 were impressed with its XML-based ION middleware, but wondered if Infor is pushing out apps fast enough.
January 22, 2002
More than any recent technology, Web services are surrounded by hype, mystery, and a bit of mumbo jumbo thrown in for good measure. Does anyone really know what they are or how they work? Find out how Web services really work.
XML Get Started
Bring yourself up to speed with our introductory content
STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared. Continue Reading
As admins get comfortable with learning PowerShell, questions come up about what tasks it automates to free up time. We answer some of those here. Continue Reading
A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device. Continue Reading
Evaluate XML Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Windows 8 and 8.1 GPOs can help with many tasks, including creating Start screen layouts that adhere to corporate policies, as well as configuring search and indexing settings. Continue Reading
Some Windows 8 and 8.1 GPO settings that you might not know about can make dealing with automatic updates from Windows Store applications a lot easier. Continue Reading
Expert Nick Lewis breaks down the evolution of the STIX framework and how it can be used to improve security threat intelligence. Continue Reading
Learn to apply best practices and optimize your operations.
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the risks. Continue Reading
When designing APIs, developers must make good decisions about security design components that show who's using what API, when and for what purpose. This tip offers insights into the critical components for securing APIs. Continue Reading
Vendors can reduce potential issues by packaging VMs into a virtual appliance for customers. Here's how to create and modify the resulting OVF file. Continue Reading
Problem Solve XML Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 8 lacked a way to enforce a consistent user experience, but thanks to PowerShell, you can provide a common Windows 8.1 Start screen. Continue Reading
When choosing between REST or SOAP for mobile apps, it's important to remember there are two major models: native and wrapped mobile web applications. Continue Reading
Read this tip from Basit Farooq to learn which time-saving and job-improving SQL Server 2012 management tools you need to know about. Continue Reading