Joe McKendrick

Contributor

Joe McKendrick is an author and independent analyst who tracks the impact of information technology on management and markets. Joe is co-author, along with 16 leading industry leaders and thinkers, of the SOA Manifesto, which outlines the values and guiding principles of service orientation. He speaks frequently on cloud, data, and enterprise computing topics at industry events and Webcasts. As an independent analyst, he has authored numerous research reports in partnership with Forbes Insights and Unisphere Research, a division of Information Today, Inc. In a previous life, Joe served as director of the Administrative Management Society (AMS), an international professional association dedicated to advancing knowledge within the IT and business management fields. He is a graduate of Temple University.

Joe McKendrick is an independent consultant, editor and speaker. Joe has performed project work (white papers, articles, blogs, research and presentations) for the following companies in the IT marketspace: CBS Interactive/CNET/ZDNet (this blog) ebizQ Evans Data Gartner IBM Informatica IDC Microsoft Systinet/HP Teradata Unisphere Reseach, a division of Information Today, Inc. WebLayers Joe has also performed research work for the following sponsoring organizations in partnership with Unisphere Research, a division of Information Today, Inc. IBM Luminex Noetix Oracle Corp. Teradata Informatica International Oracle Users Group Oracle Applications Users Group Professional Association for SQL Server International DB2 Users Group International Sybase Users Group SHARE (IBM large systems users group)

Latest from Joe McKendrick

Show search filters
Expert: SOA vulnerable to DNS security flaw, too

Expert: SOA vulnerable to DNS security flaw, too

This just in from the Black Hat security confab currently taking place in Las Vegas: Dan Kaminsky, a well-known IT security researcher, disclosed his findings around the Domain Name Server flaw (or DNS cache poisoning vulnerability), and where it can bite. Tim Wilson of Dark Reading reported on Kaminsky's presentation, who said the flaw enables attackers "to exploit the DNS design to quickly guess the transaction ID of an address query and potentially re-route the user to an unexpected domain.

August 6, 2008 by in Servers