<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7424681237938798720</id><updated>2024-10-24T05:37:34.167-07:00</updated><category term="AppScan"/><category term="Introduction"/><category term="SOA"/><category term="Security"/><title type='text'>The &quot;A&quot; in SOA</title><subtitle type='html'>Service-Oriented discussions from a Rational Perspective</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://rationalsoa.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7424681237938798720/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://rationalsoa.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Steve Weaver</name><uri>http://www.blogger.com/profile/03061931933463717451</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7424681237938798720.post-5055127994483684560</id><published>2009-02-06T10:09:00.000-08:00</published><updated>2009-02-06T10:19:45.842-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AppScan"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="SOA"/><title type='text'>IBM Helps Companies Secure their Web Businesses</title><content type='html'>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot; ;font-arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM today announced new capabilities designed to address the security and compliance concerns of businesses creating dynamic and interactive Web sites.  As companies infuse more Web 2.0 content into their global, online presence, they are seeing an increased risk of security vulnerabilities. Using &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www-01.ibm.com/software/awdtools/appscan/standard/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM Rational AppScan&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, companies can now test Web 2.0-based applications to identify security vulnerabilities on a frequent basis, helping to make the Web experiences they prov&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;ide to customers more secure from hackers. The new features also enhance customers’ abilities to address regulatory mandates and meet business policies.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Helping to Secure Online Businesses from Web 2.0 and SOA Vulnerabilities&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;According to the newly released 2008 &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www-935.ibm.com/services/us/iss/xforce/trendreports/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM X-Force Trend Report&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, Web applications remain the Achilles heel for the security industry. In fact, more than half of all vulnerabilities disclosed in 2008 were Web application based.  Many of these vulnerabilities can be prevented or avoided by taking a preemptive approach to security.  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Despite these shortcomings, companies increasingly rely on their Web presence to serve as the face of their business, drive collaboration and community-building, and generate new opportunities in today&#39;s global economy. To remain competitive, organizations are using a new set of Web 2.0 capabilities, derived from technologies such as the Adobe® Flash® platform, or Ajax (Asynchronous JavaScript and XML), to create interactive and graphically rich Web sites. However, due to the dynamic and changing nature of these technologies, companies are facing new challenges for meeting the compliance and security needs of their online businesses. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Hackers and other cyber criminals target Web 2.0 technologies because of their prevalence across the Web. &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www-01.ibm.com/software/awdtools/appscan/standard/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;With IBM Rational AppScan Standard Edition 7.8&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, IBM is introducing new functionalities that enable companies to scan and test rich, Flash-based Web content and applications for security defects before the content is deployed. This new software can also scan Web sites built with Ajax technology. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;“The use of Adobe Flash Platform technologies in the enterprise is increasing, and software such as IBM Rational AppScan can help content creators take a preemptive approach to security,” said Brad Arkin, director, Adobe Secure Software Engineering Team at Adobe. “By scanning and testing code for potential issues in the early development stages, companies can help prevent security and compliance problems before they ever happen.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;For companies that are concerned that their Web services will face the same vulnerabilities as their Web applications, the new version of IBM Rational AppScan now also supports complex Service Oriented Architecture (SOA) applications.  This new technology from IBM provides organizations with the ability to scan their critical Web services, representing a significant step forward in the testing support available for SOA environments.  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Managing the Ongoing Risk of Compliance and Security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM today also announced new risk assessment capabilities in this new version of IBM Rational AppScan. The new features help customers better understand where security vulnerabilities are located and suggest an action plan to minimize further risk.  According to IBM research, 80% of users&#39; time is spent on managing the results of security scans.* Even after an issue is identified, users might have trouble understanding the issue, validating whether it really exists, determining how severe it is, and communicating it to other teams who can help fix the problem.  With IBM Rational AppScan, customers will save valuable time and money by receiving results that are communicated in a common language that non-security experts understand.  &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Through new production monitoring capabilities delivered with IBM&#39;s Rational AppScan OnDemand offering, users can also catch and be alerted to vulnerabilities, making it easier and quicker to repair flaws and remain compliant. This is especially critical for organizations that make frequent changes to their Web site, and that have an increased need to scan for security vulnerabilities on a regular basis. For instance, a large company that updates its Web site every 15-minutes can now automatically scan their online application four times per hour (i.e. 96 times per day), helping to creating a safer online experience for its customers. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Additionally, security alerts can be sent to mobile devices as they occur, allowing customers to quickly fix vulnerabilities.  Previously, security experts would only test applications before they went into production, which would not address the further risks posed after deployment.  Today, speed and responsiveness are crucial when dealing with dynamic applications, given the time and money that organizations can lose due to failing to meet compliance mandates or exposing their customers&#39; data to hackers.  With IBM Rational AppScan OnDemand, customers now can have confidence that they can continuously act to protect their Web sites and manage compliance risks. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Addressing Security and Compliance throughout the Lifecycle&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Customers can also lower costs by implementing security testing throughout the entire software delivery lifecycle, from development through the post-production phase.  Bug-ridden, poor quality software costs businesses billions of dollars annually and the cost of identifying and repairing a software defect in a product that is already being used by consumers can cost upwards of $16,000 for each defect.  By integrating &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www-01.ibm.com/software/awdtools/appscan/tester/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM Rational AppScan Tester Edition&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt; into the recently released &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www-01.ibm.com/software/rational/offerings/quality/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM Rational Quality Manager&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;, teams can build security and compliance testing into the software development and delivery process, avoiding many problems that can be extremely costly to fix at a later point in the software delivery lifecycle. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&quot;We&#39;re witnessing a trend with governments mandating that organizations deliver software built with security-tested code. Clearly, application security is moving towards being a compliance requirement, not just a best practice,&quot; said Dr. Daniel Sabbah, general manager, IBM Rational Software. &quot;It&#39;s more crucial than ever for customers to treat security and compliance as a top priority.  By offering customers the ability to infuse continuous security testing into their Web 2.0 and SOA application development, IBM can help them reduce cost, manage risk and provide better online experiences for consumers.&quot; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;IBM Rational offers security solutions that span across all areas of application delivery, including the development, testing, deployment and operational phases.  To learn more about IBM Rational’s security solutions, please visit: &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.ibm.com/software/rational/offerings/websecurity/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;http://www.ibm.com/software/rational/offerings/websecurity/&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rationalsoa.blogspot.com/feeds/5055127994483684560/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rationalsoa.blogspot.com/2009/02/ibm-helps-companies-secure-their-web.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7424681237938798720/posts/default/5055127994483684560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7424681237938798720/posts/default/5055127994483684560'/><link rel='alternate' type='text/html' href='http://rationalsoa.blogspot.com/2009/02/ibm-helps-companies-secure-their-web.html' title='IBM Helps Companies Secure their Web Businesses'/><author><name>Steve Weaver</name><uri>http://www.blogger.com/profile/03061931933463717451</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7424681237938798720.post-7812243671238463136</id><published>2009-02-06T08:33:00.000-08:00</published><updated>2009-02-06T10:20:30.472-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Introduction"/><title type='text'>Welcome!</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(32, 64, 99);   font-family:Tahoma;font-size:11px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;Welcome to The &quot;A&quot; in SOA - a place where you can find out the inside scoop on what&#39;s happening in the world of SOA, with a particular emphasis on SOA solutions from  IBM Rational. I look forward to providing some insight on Rational&#39;s approach to SOA, and updating this blog with links to new demos, webcasts, podcasts and other materials, as well as providing commentary and discussion on SOA more generally.&lt;br /&gt;&lt;br /&gt;A little background - I&#39;m currently the Market Manager for SOA at Rational, which means it&#39;s my job to bring Rational&#39;s SOA solutions to market, through events such as IMPACT and RSDC, live webcasts, podcasts and demos, and technical whitepapers. Rational has an extensive portfolio of SOA solution offerings, and I&#39;ll be addressing these in upcoming posts.&lt;br /&gt;&lt;br /&gt;So, check back here often to find whats new with current and upcoming Rational SOA solutions such as tools like Rational Application Developer, Rational Asset Manage, Rational AppScan and Telelogic System Architect.&lt;br /&gt;&lt;br /&gt;Also - drop me a note on how we can improve our marketing outreach, our product portfolio and this blog.&lt;br /&gt;&lt;br /&gt;For more information, you can go to the Rational SOA &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://ibm.com/rational/soa&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;homepage &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;at IBM.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rationalsoa.blogspot.com/feeds/7812243671238463136/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rationalsoa.blogspot.com/2009/02/welcome.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7424681237938798720/posts/default/7812243671238463136'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7424681237938798720/posts/default/7812243671238463136'/><link rel='alternate' type='text/html' href='http://rationalsoa.blogspot.com/2009/02/welcome.html' title='Welcome!'/><author><name>Steve Weaver</name><uri>http://www.blogger.com/profile/03061931933463717451</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>