DQL is the language used to query Documentum, which is a content management system used to create, manage, deliver, and archive all types of content from text documents and spreadsheets to digital images, HTML, and XML components.
Cookies and PIE – An Introduction to Flash Security
Web-enabled consumers are tossing their cookies in greater numbers; and although this phenomenon is related to the stomach-churning activities of some Internet marketers and their offerings, it has more to do with taking back control of their Web browsing, and less to do with violent physiological reactions to bad snack food.
Introduction: IP Spoofing
An article on “Security Problems in the TCP/IP Protocol Suite” by S.M.Bellovin in 1989 initially explored IP Spoofing attacks . He described how Robert Morris, creator of the now infamous Internet Worm, figured out how TCP created sequence numbers and forged a TCP packet sequence.
A Gentle Introduction to Cryptography
With the increasing incidence of identity thefts, credit card frauds, social engineering attacks, the digital world is facing challenges in the years ahead. Obviously, cryptography, a young science, will play a prominent role in the security of protecting digital assets. This article tries to explain the basics of cryptography (encryption) using plain language.
Cisco CCNP Certification: Introduction To BGP
Cisco certification candidates are introduced to BGP at the CCNP level, but the reaction to its introduction always reminds me of something I see often as the CCNA level.
Introduction to Private Equity Investing
Private Equity Investing is investing into privately owned companies. A private investor can inject capital into a business that needs it. In return they will receive part-ownership in the company.
Introduction to Bluetooth and J2ME Part 2
In Part 1 we went over the basics of Bluetooth technology and some possible development opportunities Bluetooth gives us. Part 2 of this article goes into a little more detail how to create a Bluetooth server and client.
Introduction to Bluetooth and J2ME
This article goes through the introduction of what is Bluetooth and what you can do with Bluetooth. Both technical aspects of Bluetooth and development tools will be briefly introduced to you; however we will not go into great detail or specifically how to develop a Bluetooth application.
Introduction To ISDN, Part IV: Configuring PPP CHAP Authentication
In part III of this ISDN primer, we learned that PPP has two main methods of authentication that Cisco certification candidates need to know how to configure: PAP and CHAP.
Open Your Introduction With A Firecracker Moment
The number one requirement, whether you are a business owner or an employee, is to be able to say what you do, and say it with influencing results. Through testing, I have seen, experienced, and received feedback that an elevator speech no longer works. My test results show that elevator speeches are too slow and too boring. People know what’s coming and have mindfully tuned out it out before the first sentence. Elevator speeches don’t stop the listener in their moment, which is exactly what you need to do. An introduction that starts with a firecracker impact does stop them in their moment.