Savvas, Antony
November 2007
Computer Weekly;11/20/2007, p65
Trade Publication
The article reports that International Business Machines Corp. has introduced software to help customers protect their business from web application security attacks. IBM said web applications are high value targets for hackers, yet many organisations have a difficult time tackling security due to a lack of application security knowledge, and the size and complexity of today's web sites that incorporate the latest in Web 2.0 technology. The first release of IBM Rational AppScan is based on a web application security technology acquired by IBM from Watchfire earlier this year.


Related Articles

  • Web 2.0: The Members Only jacket of the industry. Boulton, Clint // eWeek;5/12/2008, Vol. 25 Issue 15, p10 

    The article reports on the iDataplex server Web 2.0 software from International Business Machine Corp. Web 2.0 functions by disseminating consumers' information in photos, files, and videos in wikis and blogs so they could share it with whom they want in the Internet. Aaron Fulkerson,...

  • Untitled. Saran, Cliff // Computer Weekly;7/21/2009, p31 

    The article reports that International Business Machines Corp. (IBM) has developed software widgets to provide travel management for LinkedIn users. As part of the company's Web 2.0 strategy to support the business need of users through social networking, IBM is providing applications for...

  • CIOs look beyond Web 2.0. Cox, John // Network World;5/26/2008, Vol. 25 Issue 21, p18 

    Information about the fifth annual Massachusetts Institute of Technology CIO symposium that was held in the U.S. is presented. The said symposium has addressed the applicability as well as the impact of the Web 2.0 applications to the computer software industry. In addition, it featured several...

  • Filtering-based defences falter as criminals ride the Web 2.0 wave. Atkinson, Matt // Computer Weekly;5/27/2008, p18 

    The article reports that the explosion in Web 2.0 applications has made them an attractive target for cyber-criminals. A Forrester survey of Web 2.0 usage within business found that 20% of employees at companies with between 500 and 999 staff were blog users. The popularity of Web 2.0...

  • INTO THE WILD: BROWSING THE WEB 2.0 SECURELY. Cunningham, Steve // AV Technology;Oct2010, Vol. 3 Issue 10, p12 

    The article discusses the security issues being faced by web 2.0 technology which is largely based on Javascript, AJAX, and other scripting technologies. As reported, these scripting technologies enable much of what people like about surfing the Internet and consuming media. But the problem is...

  • IBM opens back-up service to SMEs. Savvas, Antony // Computer Weekly;8/1/2006, p18 

    The article reports that International Business Machines (IBM) Corp. will distribute its Tivoli Continuous Data Protection for Files software to small business. Under an online distribution agreement with Digital River, IBM will dispense and sell the software. According to Hershel Harris, IBM...

  • Technology sequels. Rapoza, Jim // eWeek;7/5/2004, Vol. 21 Issue 27, p41 

    This article presents information about technologies like the one where companies purchase physical software products delivered through Web browsers or thin clients, a company deciding to have key corporate applications such as CRM or sales force automation delivered from a hosted service. Come...

  • Getting creative with mashups. Taft, Darryl K. // eWeek;3/17/2008, Vol. 25 Issue 9, p24 

    The article focuses on the adoption of Web 2.0 technologies such as mashups and Creative Commons licensing by the U.S.-based Serena Software Inc. On March 3, 2008, the company disclosed its plans to create a portfolio of offerings based on software as a service technology. The Creative Commons...

  • IBM aids SMB development. Fonseca, Brian // eWeek;5/9/2005, Vol. 22 Issue 19, p16 

    This article reports that International business Machines (IBM) Corp. is simplifying integration and adding context to unstructured data buried deep within IT architectures in an effort to improve information management for SMBs. To allow small and midsize businesses to accelerate application...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics