March 23, 2015
Cisco says a vulnerability in some of its IP phones for SMBs could allow eavesdropping. A fix is not yet available, but Cisco has offered mitigation techniques.
September 16, 2014
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
April 24, 2013
Users and analysts at Inforum 2013 were impressed with its XML-based ION middleware, but wondered if Infor is pushing out apps fast enough.
January 22, 2002
More than any recent technology, Web services are surrounded by hype, mystery, and a bit of mumbo jumbo thrown in for good measure. Does anyone really know what they are or how they work? Find out how Web services really work.
XML Get Started
Bring yourself up to speed with our introductory content
As the tech world evolves, Windows administrators need to get familiar with creating and handling XML files. Continue Reading
STIX (Structured Threat Information eXpression) is an XML programming language that allows cybersecurity threat data to be shared. Continue Reading
As admins get comfortable with learning PowerShell, questions come up about what tasks it automates to free up time. We answer some of those here. Continue Reading
Evaluate XML Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
OpenID or SAML? These are but two choices you need to make when setting up SSO service for your enterprise employees. Learn what factors are at play in this crucial access decision. Continue Reading
Windows 8 and 8.1 GPOs can help with many tasks, including creating Start screen layouts that adhere to corporate policies, as well as configuring search and indexing settings. Continue Reading
Some Windows 8 and 8.1 GPO settings that you might not know about can make dealing with automatic updates from Windows Store applications a lot easier. Continue Reading
Learn to apply best practices and optimize your operations.
Administrators can avoid introducing errors when building an XML file by using PowerShell to construct the document. Continue Reading
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the risks. Continue Reading
When designing APIs, developers must make good decisions about security design components that show who's using what API, when and for what purpose. This tip offers insights into the critical components for securing APIs. Continue Reading
Problem Solve XML Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Users can customize the Windows 10 Start menu, but you might not want them to for business reasons. Luckily, there's a way you can make it so all workers use the same Start menu configuration. Continue Reading
Windows 8 lacked a way to enforce a consistent user experience, but thanks to PowerShell, you can provide a common Windows 8.1 Start screen. Continue Reading
When choosing between REST or SOAP for mobile apps, it's important to remember there are two major models: native and wrapped mobile web applications. Continue Reading