X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 rfc 959


The Future of Secure Remote Password (SRP)
The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other

rfc 959  Authentication and Security Layer) RFC 2222. It is often used with popular Internet protocols such as POP3, IMAP, SMTP, and LDAP. http://www.ietf.org/internet-drafts/draft-burdis-cat-srp-sasl-07.txt (web site containing draft for SRP implementation of SASL mechanism). Acceptance of the SASL into the Java programming language is pending. The Java Community Process accepted the final draft of the JSR 28 in March, 2002. In September 2002, a maintenance update (the first maintenance release) was proposed

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » rfc 959

SAP Weaves Microsoft .NET And IBM WebSphere Into Its ESA Tapestry Part Two: Market Impact


With SAP NetWeaver and the Enterprise Services Architecture, SAP will have delivered the blueprint for turning Web services from a concept into business reality of uniting hardware, information, and software platforms & applications.

rfc 959   Read More

A VoIP Primer-Everything You Need to Know about VoIP


Are you considering voice over Internet protocol (VoIP) for your organization? We’ll take a comprehensive look at how VoIP works, and what you should know before selecting a VoIP vendor.

rfc 959   Read More

E-mail 101


The first e-mail programs were created in the late 60s/early 70s—simpler times, when everyone on the network was trustworthy. Even knowing what we know today about spammers, we still tend to take e-mail for granted, and trust it far more than it deserves. Learn about the components of the e-mail system, understand how e-mail moves on the Internet, and find out how to interpret e-mail message headers.

rfc 959   Read More

Firewall Cowboyz Set the Stage to Free Innocent Convict


Cowboyz.com builds and sells affordable firewall appliances to small to medium sized businesses. When not deploying firewalls, this small-time firewall vendor gives something back by taking notice and assisting to restore justice to a falsely accused convict.

rfc 959   Read More

What's Wrong With Enterprise Applications, And What Are Vendors Doing About It?


With increased competition, deregulation, globalization, and mergers & acquisition activity, enterprise software buyers realize that product architecture plays a key role in how quickly vendors can implement, maintain, expand/customize, and integrate their products. Many in the enterprise applications vendors' community recognize that these are unmet realities and are attempting to offer solutions that will deal with them. While it is not practical to look at every strategy and every vendor's nuance, this note looks at some important examples representing distinct strategic approaches.

rfc 959   Read More

IPSec VPNs for Extranets: Not what you want to wake up next to


In general VPNs are ill suited to building multi-company extranets, for any situation that extends across organizational boundaries, or where there is unbalanced trust between end points. This article discusses the basic requirements for a true extranet solution.

rfc 959   Read More

SAP Opens The ‘Miss Congeniality’ Contest


While SAP’s determination to become enterprise applications Web Esperanto evangelist is of paramount importance to its customers and for the general market direction, one should by no means expect short-term tectonic moves.

rfc 959   Read More

Network Security Best Practices: Competitive Analysis


When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services for Internet protocol (IP) networks are emerging that enable new levels of scalability and manageability—while remaining completely transparent to the network. By applying this type of system, you build an optimal framework for future security applications.

rfc 959   Read More

HP “Medals” In U.S. PC Olympics


In the U.S. desktop PC market, Hewlett Packard and Gateway have been closely embroiled for the #3 position in the market. This trend will not continue. TEC forecasts a widening lead for HP throughout 2000.

rfc 959   Read More

SAP NetWeaver Background, Direction, and User Recommendations


SAP is using NetWeaver to reach to the shop floor by aggregating and presenting information to users, thus empowering them to improve manufacturing performance. It is also addressing concerns about the lack of standards for interoperability between various systems.

rfc 959   Read More