Peter Coffee is Director of Platform Research at salesforce.com, where he serves as a liaison with the developer community to define the opportunity and clarify developers' technical requirements on the company's evolving Apex Platform. Peter previously spent 18 years with eWEEK (formerly PC Week), the national news magazine of enterprise technology practice, where he reviewed software development tools and methods and wrote regular columns on emerging technologies and professional community issues.Before he began writing full-time in 1989, Peter spent eleven years in technical and management positions at Exxon and The Aerospace Corporation, including management of the latter company's first desktop computing planning team and applied research in applications of artificial intelligence techniques. He holds an engineering degree from MIT and an MBA from Pepperdine University, he has held teaching appointments in computer science, business analytics and information systems management at Pepperdine, UCLA, and Chapman College.
“Patch management is, by far, the biggest problem” in keeping systems secure, declared Microsoft Strategic Technology Director Brett Arsenault at the IT security conference hosted this week in Boise by Washington Group International. “Its not just our issue,” he continued, claiming that security patch activity on competing operating systems is twice as great, “but we […]
The Wizard of Oz is a parable of computer and network security, said Ira Winkler, chief security strategist of Hewlett-Packard Co., at the conference on IT security hosted this week by Washington Group International in Boise, Idaho. “The moral of the story only seems to be, Theres no place like home,” said Winkler, who delighted […]
Application developers know that Microsoft never puts out a platform without offering a matching set of tools. What Visual Basic 1.0 did for the Windows GUI, last years Visual Studio .Net did for network-based applications. That trend continues with Visual Studio .Net 2003, which can reasonably claim to offer developers a single portal to crafting […]
If I asked you to name the internets dominant operating system, youd probably nominate Linux, Windows or possibly Solaris. My answer would be none of the above. Increasingly, our most value-adding interface layer is Google—and our industrys annals of operating system wars and browser wars are looking ever more like ancient history. It might seem […]
Coming to market today after months of early-adopter testing, Preventsys 1.0 is a network auditing system whose specifications seem like an echo of eWEEK Labs security process recommendations during the past several years. I hope to be talking soon with some of the companys customers, but I found early drafts of the companys forthcoming technical […]
Youve seen the TV auto ads that warn, “Professional driver, closed course. Do not attempt.” They remind me of microprocessor companies dueling over which has the fastest chip. The benchmarks they cite recall the empty city streets, deserted mountain roads and other venues beloved of ad directors but rarely encountered in day-to-day driving. Perhaps “do […]
Its not an easy time to be Intel Corp. or Advanced Micro Devices Inc. The launch of AMDs Opteron emphasizes the difference between their technology strategies, but the companies are just placing different bets in the same casino. Both companies hope that the mass-market economics of high-volume processor production will draw resource-limited server manufacturers—and cost-conscious […]
In remarks at the launch of Windows Server 2003, Microsoft CEO Steve Ballmer enthused that the companys new product “is secure by default, with 60 percent less attack surface area by default compared to Windows NT 4.0 Service Pack 3.” What? Its obvious that this number is meant to suggest a smaller chance of a […]
Its not an easy time to be either Intel or AMD. The launch of puts the spotlight on the almost trivial difference between their strategies, but the companies are really just placing different bets in the same casino of complex and costly designs. Its a gaming hall that both of these chip makers were forced […]
To users and operators of information systems, the plummeting costs of digital storage and processing power are becoming as much a threat as a blessing when it comes to protecting data privacy. Massive processor complexes combing through vast banks of data are silver-bullet solutions for those whod like to gain unauthorized access to the byproducts […]