Rocky Mountain Software Symposium
May 16-18, Denver, Colorado
The Rocky Mountain Software Symposium will offer over 40 sessions on
XML, Java 2 Platform, Enterprise Edition (J2EE), Web Services,
Agile Methodologies and open source. Some speakers include Ted Neward,
Sue Spielman, Glenn Vanderburg and Jason Hunter.
Eunis 2003: July 2-4 in Amsterdam
IT and Academics
Eunis 2003 will be held July 2-4, 2003, at the Universiteit van
Amsterdam in Amsterdam. This is the ninth conference of European Univerisity
Information Systems (EUNIS). The conference will be a unique
opportunity for dialogue between academics and professionals from
Information and Communication Technologies (ICT) companies. John Gage,
chief researcher and science office director at Sun, is one of the
June 29-July 2 in Seattle, Washington
This year's National Educational Computing Conference (NECC) theme is
Visions & Reflections. The conference will evaluate how technology has
shaped education and if the needs of future learners changed as a
result of technology's influence on society. Workshops will cover
meeting NCLB mandates; hands-on training in the latest multimedia, Web,
and wireless technologies; productivity and management tools and more.
May Sun User Group Meetings
Sun supports worldwide user groups for a number of software
products. These user groups typically hold two, in-person meetings each
year where attendees hear directly from the product teams at Sun and
have the chance to exchange technical information with peers in
other customer organizations. One meeting will be online; the others will be in India and New York.
"The Gradual Maturity of Standards With Time"
Rags Srinivas on the Stepwise Refinement Standards Process
Rags Srinivas, in his technical article "The Gradual Maturity of
Standards With Time," reviews the standards process and its strategy of
stepwise refinement, which leaves a particular standard improved after
each of the steps it is subjected to. He refers also to interoperability
testing, often conducted long after a standard is publicly accepted,
which can result in yet further modifications.
Improving Translatability With Sun Proof
Sun's Initiatives in Controlled Authoring and Machine Translation
A recent LISA Newsletter article, "Improving Translatability -- A Case
Study at Sun Microsystems Inc.," examines Sun's initiatives in
controlled authoring and machine translation. With assistance from the
Institute of Applied Information Sciences (IAI), the company created Sun Proof technology, which provides improvements in the
translatability of source texts for machine translation.
"Configuring the Secure Shell Software"
Sun BluePrints Article on OpenSSH and the Solaris Secure Shell software
The Sun BluePrints OnLine article, "Configuring the Secure Shell
Software," offers recommendations on configuring two specific Secure
Shell implementations for the Solaris Operating System (Solaris
OS): OpenSSH and the Solaris Secure Shell software. The document
includes the mechanics of configuration files, general recommendations
and client recommendations.
Intruder Detection Checklist
Where to Look for Signs that Your System May Have Been Compromised
The CERT Coordination Center outlines an
Intruder Detection Checklist for determining if a UNIX system has
been compromised. The information can be used by system administrators
to look for several types of break-ins. The document includes ten
specific signs of possible compromise, from log files to the local
List of Security Tools from CERT Coordination Center
Tools for Network Monitoring, Authentication, Vulnerabilities and More
The CERT Coordination Center has provided a List of Security Tools that
can be used to help secure a system and deter break-ins. The list
covers a range of tool types, including network monitoring tools,
authentication/password tools, tools to help scan hosts for known
vulnerabilities and multi-purpose tools.
"A Reverse Proxy Is A Proxy By Any Other Name"
Security Document From the SANS Institute's InfoSec Reading Room
A document from the SANS Institute's InfoSec Reading Room, "A
Reverse Proxy is a Proxy by Any Other Name," examines the concept of a
reverse proxy along with its infrastructure, pros, cons and
implementation. The reverse proxy is one which proxies on behalf of the
backend HTTP server, not on behalf of the outside client's request.