Software  >   Systems Software  >   Network Management Software  >   Network Monitoring Software  >   Web Site Monitoring Software  >  

Internet Usage Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Internet Usage AnalysisReports
 
A Practical Guide to Java Success with Crafter CMS
sponsored by Crafter Software_Rivet Logic
EBOOK: The following e-book introduces and thoroughly explains how to master the craft of Java-based, CMS driven websites and applications.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

Crafter Software_Rivet Logic

The 2011 Mid-Year Top Cyber Security Risks Report
sponsored by HP Enterprise Security.
ANALYST REPORT: This 2011 mid-year report offers an in-depth analysis on this risks organizations face today, with special focus on web applications, including the vulnerabilities that exist and the attacks that are exploiting those weaknesses. View now to explore vulnerability trends, attack trends, mitigation strategies and much more.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

Personalized Marketing and Web Analytics
sponsored by IBM
WHITE PAPER: In this white paper, uncover the gold mine that lies within behavioral data, identify the specific nuggets to mine, and learn how to leverage behavior data to increase marketing returns at every stage of the customer life cycle, both online and offline.
Posted: 01 Mar 2014 | Published: 28 Feb 2013

IBM

BlueArc's Titan Helps WebTrends Reduce Costs and Management Overhead
sponsored by BlueArc Corp.
CASE STUDY: In this case study, WebTrends needed to find a storage system that would better support their on-going business growth. Learn how BlueArc's Titan was the answer to their solution, due to its unique, highly scalable product architecture.
Posted: 11 Sep 2005 | Published: 01 Sep 2005

BlueArc Corp.

The Shortcut Guide to Assuring Website Performance through External Web Monitoring
sponsored by Neustar®
EBOOK: Businesses have become dependent on Web sites and RIAs. As dependency increases, so does the complexity of Web site systems and expectations on service delivery. This book offers a detailed look at external monitoring, how to leverage monitoring to protect your brand and a roadmap for implementing and maintaining an external monitoring process.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

Neustar®

Sun Business Intelligence Solution for Web Infrastructure
sponsored by Sun Microsystems, Inc.
PRODUCT OVERVIEW: The combination of Sun Open Storage and the commercial open-source Infobright data warehousing and Pentaho business intelligence and ETL software packages dramatically lowers the cost of entry and simplifies deployment of a powerful, sophisticated BI infrastructure.
Posted: 12 Oct 2009 | Published: 09 Oct 2009

Sun Microsystems, Inc.

Tips from the Trade – Competing on Web Analytics
sponsored by SAS
WEBCAST: The online channel has been one of the more successful areas of business during these economic times, but most businesses are still behind when it comes to web analytics. Watch this webcast to also learn the overall best practices and the future needs within online analytics.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

SAS

Site and Commerce Search: Driving ROI through Vendor Selection, Proper Implementation, and Active Measurement
sponsored by WebSideStory
WHITE PAPER: In this white paper, independent analyst JupiterResearch examines how site search drives positive ROI and tells you which vendors are providing market-leading customer facing search applications.
Posted: 25 Jul 2005 | Published: 01 Jul 2005

WebSideStory

Advancing Your Digital Marketing Strategy with Webtrends Analytics
sponsored by WebTrends
WHITE PAPER: In the age of social media, web analytics can help you harness data from a variety of channels to construct and implement an effective, integrated marketing strategy. Check out this helpful white paper to learn how you can advance your digital marketing strategy, grow brand loyalty and build revenue through the use of analytics.
Posted: 18 Apr 2013 | Published: 18 Apr 2013

WebTrends

Web application security: automated scanning versus manual penetration testing
sponsored by IBM
WHITE PAPER: There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods.
Posted: 09 Sep 2009 | Published: 01 Jan 2008

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement