Category: Archive

What is a Web Service?

Try to find an article on the Web that explains, in plain English, what a “Web Service” is and you’ll be going around in rhetorical circles with no simple explanation, and no examples. Most articles start out with some ambiguous explanation like: “Web services identified with WSDL and UDDI protocols make functionality available over the Internet using SOAP encapsulated in XML envelopes” and then the articles start spewing out programming code. Examples of programming code don’t help if you don’t have an overview of what a Web Service is.

Business Investment or Divine Intervention: Understanding Angel Investors

You’ve already gone to friends and family for help. You know your company doesn’t qualify for a bank loan. And it’s too early for venture capital. So what’s an entrepreneur to do? Start looking for an angel investor. Angel investors — private individuals who invest their own money in companies — fund more companies at an earlier stage with more dollars than any other kind of capital.

Two Secrets to Getting More Done in Less Time

You’re completely bogged down with work. This week you must complete three client proposals, and two of your staff are out sick. You feel you have a better chance of sprouting wings and flying than getting those proposals done. From experience, you know that each proposal will take around four hours to do. However, you just don’t have those 12 hours to spare. You decide that you will have to call your clients, tell them that you’re overwhelmed, and assure them that you will deliver the proposals next week.

Windows: How to Protect a Hacker’s Favorite Target

Hacking incidents are on the rise – August 2002 was the most active month for hacking since the dawn of the Internet. The target? Primarily Windows systems. Formerly Linux systems were the hacker’s target of choice, but now they’re breaking their way in to the Windows OS.

One reason for the switch is that cracking a Linux server is a point of pride; Linux admins are typically security-conscious and pose a challenge to the intellectual hacker. With such ego-inflating attacks on the decline and criminal attacks on the rise however, Windows systems are more popular targets because they’re easier to break into. Microsoft releases warnings about security holes constantly, with patches following quickly. But how quickly are these patches located and applied? The lazy, criminal hacker hopes you’ll forget to patch and make his break in easy.

Back To Top