======================================================================== TEST CENTER REPORT http://www.infoworld.com ======================================================================== Monday, November 1, 2004
======================================================================== * Developers aim to rid source code of bugs * Source code analysis breaks new ground * Big picture security * In search of security event standards ADVERTISEMENT -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Crate & Barrel needed a state of the art communications platform for its new headquarters. SBC Datacomm's solution: an IP-based telephony infrastructure that is expected to save the retailer $180,000 over five years, as compared with a traditional PBX. Register now to view this white paper: http://newsletter.infoworld.com/t?ctl=9AD40D:2B910B2 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- DEVELOPERS AIM TO RID SOURCE CODE OF BUGS ======================================================================== Posted October 30, 2004 3:00 PM Pacific Time Dawson Engler is chief scientist with Coverity and Ben Chelf is chief evangelist. We asked them to elaborate on the advances to source code analysis that they orginally developed at Stanford. For the full story: http://newsletter.infoworld.com/t?ctl=9AD406:2B910B2 SOURCE CODE ANALYSIS BREAKS NEW GROUND ======================================================================== Posted October 29, 2004 3:00 PM Pacific Time Large-scale software systems are staggeringly complex works of engineering. Bugs inevitably come with the territory and for decades, the software profession has looked for ways to fight them. We may not see perfect source code in our lifetime, but we are seeing much better analysis tools and promising new approaches to remedy the problem. For the full story: http://newsletter.infoworld.com/t?ctl=9AD40A:2B910B2 BIG PICTURE SECURITY ======================================================================== Posted October 29, 2004 3:00 PM Pacific Time There was a time when cutting-edge network security meant a firewall on your perimeter and anti-virus software on the desktop. No longer. With the advent of polymorphic Internet worms, application-layer attacks, Trojan horses, adware, spyware, and wireless hacks, the network security picture is more complicated than ever. For the full story: http://newsletter.infoworld.com/t?ctl=9AD407:2B910B2 IN SEARCH OF SECURITY EVENT STANDARDS ======================================================================== Posted October 29, 2004 3:00 PM Pacific Time Integrating SEM (security event management) technology with existing security and system management infrastructure can be a hair-raising experience. Security point products such as IDSes, anti-virus gateways, and vulnerability scanners tend to use proprietary formats for reporting, recording network events, and issuing alerts. And the standard formats that do exist -- such as SNMP and syslog files -- are limited in what they can convey. For the full story: http://newsletter.infoworld.com/t?ctl=9AD405:2B910B2 ======================================================================== Track the Top AppDev Stories in One Email a Week InfoWorld defines technology for business. That's why there's no better, more reliable source for enterprise application development news and analysis, whether you're tracking applications by technology or by industry. And that's why InfoWorld's weekly Application Development Report, a free weekly newsletter, is your one-click trick for tracking what matters in appdev. Subscribe now at http://newsletter.infoworld.com/t?ctl=9AD408:2B910B2 ADVERTISE ======================================================================== For information on advertising, contact [EMAIL PROTECTED] UNSUBSCRIBE/MANAGE NEWSLETTERS ======================================================================== To subscribe, unsubscribe or change your e-mail address for any of InfoWorld's e-mail newsletters, go to: http://newsletter.infoworld.com/t?ctl=9AD409:2B910B2 To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew or correct a problem with any InfoWorld subscription, go to http://newsletter.infoworld.com/t?ctl=9AD40C:2B910B2 To view InfoWorld's privacy policy, visit: http://newsletter.infoworld.com/t?ctl=9AD40B:2B910B2 Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107 This message was sent to: [EMAIL PROTECTED]
