Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >   Web Browsers  >  

Internet Explorer (Software)

RSS Feed    Add to Google    Add to My Yahoo!
Internet Explorer (Software)Reports
 
CW Special Report on Microsoft
sponsored by ComputerWeekly.com
IT BRIEFING: This 12 page special report updated for 2012 gives you the facts on Microsoft, its strategy, products and services and financial performance.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

ComputerWeekly.com

Computer Weekly buyer’s guide to Windows XP support
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Microsoft will end technical support for its Windows XP operating system in April 2014. Computer Weekly looks at what this means for those businesses that have yet to migrate to newer alternatives.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

Guide: Migrating from Windows XP to Windows 7
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.
Posted: 16 Jul 2012 | Published: 05 Nov 2011

ComputerWeekly.com

Web Browser Security Features Make Attacks Harder
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

GeoTrust, Inc.

Overcoming Applications Barriers to Windows 7 Migration
sponsored by Symantec Corporation
WHITE PAPER: This paper outlines the applications barrier to Windows 7 migration, explores alternative ways to resolve it, presents Altiris Deployment Solution, and illustrates its compelling advantages for your Windows 7 migration and beyond.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Symantec Corporation

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Real-Time Analytic Mobile Application
sponsored by Workday
WEBCAST: Watch this concise webcast to uncover all the ins-and-outs of the real-time analytic mobile application.
Posted: 18 Apr 2014 | Premiered: Aug 13, 2013

Workday

Download Unitrends Enterprise Backup for VMware, Free for 30 days
sponsored by PHD Virtual
SOFTWARE DEMO: This resource provides a download link for Unitrends Entrerprise Backup, which proves physical and virtual backup for 100+ versions of operating systems and applications.
Posted: 16 Apr 2014 | Premiered: 16 Apr 2014

PHD Virtual

The World of User Experience Design
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success.
Posted: 10 Mar 2014 | Premiered: Nov 17, 2013

Hewlett-Packard Limited

Challenges around web 2.0 apps and how performance tools can help
sponsored by Borland, Micro Focus
PODCAST: Tune in to this podcast to explore challenges specific to web 2.0 applications and learn how to meet the performance testing needs of these apps with an enterprise-class performance testing tool.
Posted: 21 Apr 2014 | Premiered: Apr 30, 2013

Borland, Micro Focus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement