Like me, you may already be all too well aware of the Trojan horse as a security threat and use regular virus checks to avoid the problem. Yet, the same idea -- smuggling through content under a label that refers to something else -- can be used with a much more positive effect.
About The Author
Paul Allen
Paul Allen served as a Senior Consultant in Cutter Consortium's Business & Enterprise Architecture practice. Prior to retiring, Mr. Allen worked for more than 35 years in most areas of IT. He earned international recognition for his pioneering work in the application of component-based development (CBD) and service-oriented architecture (SOA) to achieve practical business value. Mr. Allen focused on the cultural aspects of enterprise SOA… Read More
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.