Application development news, tools, and how-tos for programmers
  • Gartner: There's life beyond WAP

    Posted February 7, 2001 - 11:35 am

    WAP (wireless application protocol) will morph into a much richer tool within the next 18 months to two years, according to analyst Gartner Group Inc.
  • Rik Farrow

    Posted February 7, 2001 - 11:28 am

    Rik provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984, and with TCP/IP networks since 1988. He has taught for the IRS, Department of Justice, NSA, US West, Royal Canadian Mounted Police, Swedish Navy, and for many US and European user groups. Farrow also consults with firms in the design and implementation of security applications.
  • SilverStream slightly diminishes programming woes

    Posted February 7, 2001 - 10:59 am

    Data, data everywhere. There is no shortage of useful business data waiting to be shared with trusted partners or fed to applications for reporting or analysis. In fact, many businesses have so much data in their systems that sifting through and organizing it for partners or applications seems almost an insurmountable task.
  • SuSE sends a message

    Posted February 7, 2001 - 10:56 am

    SuSE recently announced two messaging platforms for enterprises that have e-mail needs ranging from simple to complex.
  • Java jobs easy to find; skills hard to come by

    Posted February 6, 2001 - 6:11 pm

    While Java is the biggest new development language to emerge in many years, a shortage of experienced Java programmers could dash all hopes within the IT industry for large-scale Java deployment anytime soon.
  • Interactive scorecard and NetResults: Directory administration tools

    Posted February 6, 2001 - 5:56 pm

    Use our calculator to see which app would best suit your needs.
  • Interactive scorecard and NetResults: Wireless LAN access points

    Posted February 6, 2001 - 5:41 pm

    Use our calculator to see which app would best suit your needs.
  • PHP: Ending the fun

    Posted February 6, 2001 - 4:01 pm

    Well folks, it has been a fun three weeks with PHP. In week one (, DocFinder: 2831), we took a 5,000-foot view of PHP, its history and market. In week two (DocFinder: 2830), we looked at how to include PHP scripts in Web pages. Last week (DocFinder: 2829), we looked at using PHP in scripts.

  • Will you be ready for the wireless enterprise?

    Posted February 6, 2001 - 1:43 pm

    WITH ALL OF the hype surrounding the wireless Internet and its promises of anytime, anywhere information availability, businesses are champing at the bit to begin exploiting the potential of this burgeoning medium.
  • Scenes from CeBit: Wireless is everywhere -- what's next?

    Posted February 6, 2001 - 11:45 am

    whole group of innovative technologies could be found on the CeBit floor.

  • JavaScript spy creates e-mail wiretap

    Posted February 6, 2001 - 10:21 am

    HTML/JavaScript-enabled e-mail readers are seen at risk as new snooping technology allows someone sending an e-mail to see what the recipient wrote when it is forwarded on to another user.
  • I-mode chief urges chip makers to think mobile

    Posted February 6, 2001 - 10:20 am

    SAN FRANCISCO -- The head of NTT DoCoMo Inc.'s popular I-mode service called on semiconductor engineers here Monday to develop new types of chips to allow the development of more advanced wireless Internet services.
  • JavaScript Does Windows

    Posted February 6, 2001 - 1:00 am

    * Webcast: Do you know everything, IT guru? Is that your final answer?

  • Sixteen Ellipses

    Posted February 6, 2001 - 1:00 am

    * Using the AffineTransform to position a series of shapes in a ring COMMUNITY DISCUSSIONS * Webcast: Making personalization work in your world of eCommerce.

  • Start-ups vie to defeat DoS attacks

    Posted February 5, 2001 - 4:22 pm

    Nobody's claiming it's easy to prevent and stop denial-ofservice attacks, but three security start-ups are vying to prove that they can minimize the threat.
  • The forgotten side of network security

    Posted February 5, 2001 - 3:50 pm

    With network security, thoughts quickly turn to hackers, viruses, Trojan horses, denial-of-service attacks and other perceived threats. However, after products are developed and deployed to minimize risk and vulnerability, we may find that we are our worst enemy. Not that we left a gaping hole in our security defense but quite the contrary. The products may be sound from a security perspective, but might fail to include provisions to preserve adequate business functionality.
  • Helping web sites take phone calls

    Posted February 5, 2001 - 3:21 pm

    Call it e-commerce without the browser. Shoppers who want to buy office supplies from Office Depot Inc.'s Web site can simply dial a toll-free number and place orders using an interactive voice-response system that does the browsing for them. Office Depot's application, built and hosted by NetByTel Inc. in Boca Raton, Fla., uses voice synthesis and recognition technologies to let shoppers find and purchase goods from the retailer's online catalog.
  • The interface revolutionary

    Posted February 5, 2001 - 3:11 pm

    Twenty-five years ago, computer screens were small and green. The desktop computer and mouse, which users take for granted today, were far from mass adoption. So it's safe to guess that in 10 or 20 years, the desktop might be replaced by something we don't currently comprehend. To get a taste of what's in store, Computerworld spoke with Jef Raskin, best known as the creator of the Macintosh project at Apple Computer Inc. Raskin's latest book, The Humane Interface: New Directions for Designing Interactive Systems (Addison Wesley, 2000), highlights the impersonal nature of most current interfaces and argues for a revolution to create better ones.
  • Source Insight develops code for less

    Posted February 5, 2001 - 3:04 pm

    In today's code development environment, projects often span multiple platforms, languages, and even geographical boundaries. Because of the many challenges of managing people throughout the code-development process, finding the right program to facilitate this work is well worth the effort and cost.
  • K-station portal brings new life to business information

    Posted February 5, 2001 - 2:51 pm

    Despite all the communications technology that most organizations use, a good deal of corporate knowledge still gets passed around the traditional way: by chance. If workers happen to see each other in the hallway, they might exchange a few words -- but if not, they won't. Clearly it's not wise to entrust your enterprise's future to such an informal and unpredictable arrangement. So how do you let your employees reliably unearth specific facts from mountains of information stored inside the enterprise, within an extranet, or on the Internet?
  • U.S. government moves to secure Linux

    Posted February 5, 2001 - 2:48 pm

    Last month's unveiling of the U.S. National Security Agency's attempt to create a truly secure Linux was the first good security news of the year. On Jan. 2 the NSA announced that it had been figuring out how to harden the popular open-source OS, and that it was sharing its prototype, dubbed Security-Enhanced Linux, and source code with the public.
  • Business-to-business pitfalls

    Posted February 5, 2001 - 2:35 pm

    The business-to-business automation story is no longer getting the rave reviews that were standard fare just one year ago. Professionals and analysts are realizing that, although the promise may still be there, the b-to-b tale is no different from the technology and business stories that preceded it. And that means that a tremendous amount of work remains to be done in the areas of enablement, integration, and adaptation of legacy applications.
  • Linux developers aim for your desktop

    Posted February 5, 2001 - 1:49 pm

    The future of Linux on the desktop is beginning to take shape at LinuxWorld Expo here this week, with developers of desktop environments for both Gnome and KDE lining up support and offering a peek at their visions of the future.
  • BEA sends b-to-b XML spec to standards group

    Posted February 5, 2001 - 1:36 pm

    In a bid to provide coordination for Web services and a model for defining and managing business-to-business interactions, BEA Systems Inc. submitted its proprietary business transaction protocol (BTP) technology to a standards body last week. BEA also formed a technical committee to shepherd BTP through the open standards process.
  • Open-source breaks into banking

    Posted February 5, 2001 - 12:27 pm

    A German bank wants to introduce open-source development to the insular, security-conscious world of investment banking.
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Join today!

See more content
Ask a Question