Archive

Information Insecurity

by January 3, 2005

Information traveling over the Internet through mail, chat or even from your website can be captured and misused. Let’s see how to safeguard it

Read More [shareaholic app="share_buttons" id="15671367"]

Understanding WMI

by January 3, 2005

How WMI helps developers in building a more manageable and stable Windows

Read More [shareaholic app="share_buttons" id="15671367"]

MS SQL Server 2005

by January 3, 2005

A new series on the upcoming MS SQL Server 2005 

Read More [shareaholic app="share_buttons" id="15671367"]

Software Testing and QA

by January 3, 2005

Software bugs and improperly tested code can cost millions of dollars in damages. So proper quality assurance mechanisms need to be put in place

Read More [shareaholic app="share_buttons" id="15671367"]

Multithreading in Java

by January 3, 2005

Create applications with simultaneously running threads

Read More [shareaholic app="share_buttons" id="15671367"]

Code Access Security

by January 3, 2005

CAS helps you design a secure application using the security subsystem of .NET

Read More [shareaholic app="share_buttons" id="15671367"]

Mail Certification 

by January 3, 2005

Signing your e-mail using GnuPG

Read More [shareaholic app="share_buttons" id="15671367"]

Easy Skinning of Java Apps

by January 3, 2005

With J2SE 1.5, you can use an XML file to skin a Java GUI application

Read More [shareaholic app="share_buttons" id="15671367"]

A GNU/Linux Audio Distro

by January 3, 2005

A distribution that quenches the thirst of audio/music freaks

Read More [shareaholic app="share_buttons" id="15671367"]

User Authentication in Linux

by January 3, 2005

Use the pluggable authentication modules to authenticate your Linux users for various applications

Read More [shareaholic app="share_buttons" id="15671367"]

Inside the Organization

by January 3, 2005

Chief concerns amongst CIOs when dealing with top management, business managers, users and their own IT teams

Read More [shareaholic app="share_buttons" id="15671367"]

Business/People 

by January 3, 2005

This the top concern amongst CIOs with over 15 years of industry experience

Read More [shareaholic app="share_buttons" id="15671367"]

Service Provider/Vendor 

by January 3, 2005

Most of the complaints in this area came from companies with IT budgets of less than Rs 1 crore

Read More [shareaholic app="share_buttons" id="15671367"]

Product/Technology

by January 3, 2005

Deploying new products and technologies was the most challenging, followed by network security and spam management

Read More [shareaholic app="share_buttons" id="15671367"]

IT Concerns 2005: Part 2nd

by January 3, 2005

Last month we carried the results of a survey-the top IT concerns in the minds of CIOs. It was conducted amongst 57 very senior IT managers of large companies-the opinion leaders amongst CIOs. This time we extended the survey to 105 respondents to include a broader base of IT managers. And what emerged is that the concerns of the opinion leaders and those of the rest are not entirely the same 

Read More [shareaholic app="share_buttons" id="15671367"]

Unexplored World of Win XP

by January 3, 2005

Some little-known commands and tools built into Win XP that can make our life easier 

Read More [shareaholic app="share_buttons" id="15671367"]

Multi-OS Emulation

by January 3, 2005

Use QEMU to emulate multiple OSs simultaneously

Read More [shareaholic app="share_buttons" id="15671367"]

Automated System Recovery 

by January 3, 2005

Restore your Win XP to system state using ASR 

Read More [shareaholic app="share_buttons" id="15671367"]

Win XP Installer and SP2 in One 

by January 3, 2005

Reduce administrative headache by creating an all-in-one installation CD

Read More [shareaholic app="share_buttons" id="15671367"]

Mobile Multimedia

by January 3, 2005

Have a pocket PC or a smart phone? Watch movies or listen to ebooks on it

Read More [shareaholic app="share_buttons" id="15671367"]