Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Graphical Browsers

RSS Feed    Add to Google    Add to My Yahoo!
Graphical Browsers Reports
 
Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Application programming interface (API), a technology for integrating applications using Web technology. This white paper identifies threats, both old and new, and provides clear solutions to address them.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

CA Technologies.

Marel guarantees MS Lync & SharePoint performances to reduce travel costs
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: This case study take an in-depth look at how one manufacturing company was able to enhance their Microsoft Lync and SharePoint solutions to improve user experience and cut travel costs.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

IPANEMA TECHNOLOGIES

Beating the Browser Wars: How to Win the Battle for Web Performance
sponsored by Gomez
WHITE PAPER: The war of the browsers is in full swing and we are stuck in the middle. This paper offers practical advice that can help you survive and even prevail in this combative environment. Read this paper to learn everything you need to know about the browser wars and how to survive them.
Posted: 03 Aug 2009 | Published: 03 Aug 2009

Gomez

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

jQuery on Rails (The Real Ones)
sponsored by The Ajax Experience
PODCAST: The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users.
Posted: 15 Jan 2009 | Premiered: Jan 7, 2009


Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Sync for Commvault Edge™
sponsored by Commvault
VIDEO: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

Commvault

Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER: Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007

Information Builders
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement