Skip to content
- Tasktop Blog » Blog Archive » Atlassian Bamboo and Crucible connectors for Eclipse Mylyn released
- YouTube – Automatic Configuration for Hadoop
- Page One Public Relations: Clients: Current Clients
- Eclipse to unwrap Swordfish in early April • The Register
- Ex-Sun ID wizards unveil the UnboundID Directory Server
"The first of those things was unveiled last week: UnboundID announced the availability of its flagship product, the UnboundID Directory Server. This is a new class of LDAP v3-compliant directory services software, designed to support the continued adoption and scale of distributed business and consumer applications, including the popular texting and smartphone applications that people use every day to work and interact. It was also announced that Alcatel-Lucent is the exclusive reseller of this technology to the global telecommunications market, and will add the UnboundID platform to its Subscriber Data Management portfolio under the name of the Alcatel-Lucent 8661 Directory Server."
- ApacheCon – Live Video Streaming
Check out the live video streams for ApacheConEU, including a keynote from James Governor!
- SaaS Credibility Survey
"As you probably know, many businesses are wary of Software-as-a-Service (SaaS) applications because of concerns about security, reliability, and vendor lock-in. In addition to building the absolutely best IT infrastructure possible, what can SaaS vendors do to assuage end user fears? Take this short survey (2-3 minutes) and let your voice be heard. "
- Eclipse Announces First Release of Swordfish, a Next Generation ESB
- HP Offers Free Web Security Tool to Help Businesses Guard Against Malicious Hackers
"With HP SWFScan, Flash developers can: * Check for known security vulnerabilities that are targeted by malicious hackers. This includes unprotected confidential data, cross-site scripting, cross-domain privilege escalation, and user input that does not get validated. * Fix problems quickly by highlighting vulnerabilities in the source code and receiving solid guidance on how to fix the security issues. * Verify conformance with best security practices and guidelines."
Categories: Links.
Recent Comments