Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >   Web Browsers  >  

Microsoft Internet Explorer

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft Internet ExplorerReports
 
Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Guide: Migrating from Windows XP to Windows 7
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7.
Posted: 16 Jul 2012 | Published: 05 Nov 2011

ComputerWeekly.com

Computer Weekly buyer’s guide to Windows XP support
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Microsoft will end technical support for its Windows XP operating system in April 2014. Computer Weekly looks at what this means for those businesses that have yet to migrate to newer alternatives.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

CW Special Report on Microsoft
sponsored by ComputerWeekly.com
IT BRIEFING: This 12 page special report updated for 2012 gives you the facts on Microsoft, its strategy, products and services and financial performance.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

ComputerWeekly.com

Overcoming Applications Barriers to Windows 7 Migration
sponsored by Symantec Corporation
WHITE PAPER: This paper outlines the applications barrier to Windows 7 migration, explores alternative ways to resolve it, presents Altiris Deployment Solution, and illustrates its compelling advantages for your Windows 7 migration and beyond.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Symantec Corporation

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Eliminate Costly Inconsistencies From Your App Development with New IT Solutions
sponsored by IBM
WHITE PAPER: In this helpful white paper, discover an application server platform which can quickly correct errors and redeploy applications, reducing the overall development cycle significantly.
Posted: 28 Aug 2014 | Published: 30 Nov 2012

IBM

Transforming Enterprise Applications for Mobile/BYOD Environments
sponsored by Dell Software
WHITE PAPER: Read this white paper for tips on how to prepare critical applications to be accessed from an array of company-owned and personal devices with different screen sizes and operating systems. Also, find out how desktop virtualization—and Dell Mobile/BYOD Solutions—can help reduce complexity and ensure application and data security.
Posted: 22 Aug 2014 | Published: 22 Nov 2013

Dell Software

Application Deployment and Release: Technology Coordinates All Moving Parts
sponsored by Automic
WHITE PAPER: Application releases now span every department of the business, and require a significant amount of effort to coordinate. This whitepaper considers technology that automates application releases, and the benefits seen by companies that have implemented a solution like this one.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Automic

The SAP System Copy Process: The Benefits of Automation
sponsored by Automic
WHITE PAPER: SAP does not provide the necessary tools out-of-the-box to automate and handle the copy process correctly. This white paper discusses the benefits of automating the SAP copy process, and the results companies can expect from streamlining the process.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Automic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement