MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 12, 2004
Michael Singer
RosettaNet Seeks Guidance on B2B The consortium turns to high-tech companies for guidance on the future architectures of e-business. mark for My Articles similar articles
InternetNews
September 1, 2004
Michael Singer
B2B Groups Link E-Business Silos RosettaNet and eBusinessReady match software testing as another step toward supply chain interoperability. mark for My Articles similar articles
JavaWorld
April 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... mark for My Articles similar articles
InternetNews
September 17, 2004
Michael Singer
RosettaNet Extends to Singapore The B2B consortium gets backing from Cisco, HP, IBM, Intel, Microsoft, and Oracle for the Architecture Center of Excellence in Singapore. mark for My Articles similar articles
InternetNews
June 28, 2010
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? mark for My Articles similar articles
JavaWorld
January 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... mark for My Articles similar articles
PC World
March 22, 2001
Cameron Crouch
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... mark for My Articles similar articles
InternetNews
December 31, 2003
Susan Kuchinskas
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? mark for My Articles similar articles
InternetNews
March 2, 2005
Susan Kuchinskas
BizTalk Accelerates RosettaNet The RosettaNet Accelerator provides specific technology and prescriptive guidance on how to connect to a Rosetta network to do B2B exchanges via XML. mark for My Articles similar articles
U.S. CPSC
November 12, 2008
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. mark for My Articles similar articles
JavaWorld
February 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. mark for My Articles similar articles
InternetNews
January 16, 2004
Michael Singer
Q&A: RosettaNet CEO Jennifer Hamilton The woman leading B2B standards efforts talks about China's role in the continued growth of e-business, RFID opportunities, and how to improve supply chain management. mark for My Articles similar articles
JavaWorld
March 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. mark for My Articles similar articles
InternetNews
March 24, 2011
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. mark for My Articles similar articles
CIO
September 1, 2001
John Orcutt
Let's Get Together The best ways to achieve the seamless integration of e-business initiatives... mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC Magazine
May 18, 2004
Bill Machrone
Secure Instant Messaging Here's how to keep IM conversations safe at work. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
OCC Bulletin
August 31, 2004
Tax Lien Certificates Description This document describes the risk management practices that the Office of the Comptroller of the Currency expects banks to exercise when purchasing tax lien certificates. mark for My Articles similar articles
Registered Rep.
March 1, 2005
Janet Wynn
Paper Torture Why does today's securities industry, which uses some of the most sophisticated technology available, still issue and distribute equities the same way it did two centuries ago --- as pieces of paper? mark for My Articles similar articles
InternetNews
May 19, 2006
Sean Michael Kerner
Calif. Court Certifies Class Action Vs. VeriSign Plaintiffs allege that they were mislead about VeriSign's SSL certificates. mark for My Articles similar articles