Welcome!


Feature

Consumers are continuing to adopt multiple connected devices and video content is expected to reach more than 70 percent of global traffic. This growth and the increased reliance on wireless networks is putting stress on existing 802.11a/b/g/n networks. As a result of this high usage, ...
If you watch the news regularly, it is easy to notice that in almost any given week some company seems to have experienced an electronic break-in or in some other way experienced a form of computer or network compromise. While computer security professionals can help to mitigate such r...
In my recent blog post – Get more out of functional web testing: How to correlate test reports with server side log information? – I discussed the problem that testing results are usually not linked to the log and diagnostics information captured by the application under test. The blog...
This article describes a method to use a perl debugger on trigger scripts without advanced interprocess debugging tools. Using a perl debugger with a V4.x server side trigger launched by the server is very difficult and encounters two known obstacles: The server will fire the tri...
The mouse was the original idea of Doug Engelbart who was the head of the Augmentation Research Center (ARC) at Stanford Research Institute. Engelbart's philosophy is best embodied, in my opinion, in the design of another device that he invented, the five-finger keyboard - with keys li...
The advent of SOA and standard-base Web services together with Internet based delivery models has provided the essential base for facilitating new software platform innovations. One of these innovations is a breakthrough software componentization technique that we have coined Service O...