Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >   Web Browsers  >  

Netscape Navigator

RSS Feed    Add to Google    Add to My Yahoo!
Netscape NavigatorReports
 
Social Networking Unleashes Creativity and Productivity
sponsored by ComputerWeekly.com
RESOURCE: CIO's have stopped dismissing social networking as they discover its potential for boosting business productivity. In this SearchCIO download, Enterprise Social Networking, discover the various aspects of social networking and explains how to keep your best employees engaged through social platforms with expert tips and success.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

ComputerWeekly.com

Resolving Issues When Creating a Cisco UCS Service Profile
sponsored by Global Knowledge
WHITE PAPER: This white paper examines several common service profile errors in Cisco UCS Service Profile and their solutions.
Posted: 28 May 2014 | Published: 28 May 2014

Global Knowledge

Extend the Value of IBM Lotus Applications to Increase Productivity with Avaya Unified Communications - Sponsored by Avaya and IBM
sponsored by Avaya
WHITE PAPER: Good communications are key to any company's success. The most successful enterprises strive for anywhere, anytime communications to best serve employees and clients who are increasingly mobile and geographically diverse. By unifying communications, a company can deliver communications anywhere, anytime and any way.
Posted: 25 Jun 2009 | Published: 25 Jun 2009

Avaya

Global Trends Drive Business Strategies
sponsored by Alcatel-Lucent
WHITE PAPER: Today’s business models do not create the commensurate revenue to fund the investment to deliver against growing traffic volumes. This is particularly salient in North America as CSPs provide more services and bandwidth on flat rate ‘all-you-can-eat’ price models. Read this paper to learn so much more.
Posted: 19 Aug 2010 | Published: 16 Aug 2010

Alcatel-Lucent

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

PeopleBrowsr Customer Story
sponsored by IBM
WHITE PAPER: This whitepaper explains who PeopleBrowsr, an organization that creates, executes, and analyzes campaigns across the entire range of social media environments, turned to when they needed massive, scalable and reliable storage for its more than 100 terabytes of data.
Posted: 29 Oct 2014 | Published: 14 Oct 2014

IBM

Case study: K2 Software Improves the Invoicing Process
sponsored by K2
VIDEO: This video case study explains how a leading provider of portcentric logistics improved the quality of its invoicing process and saved £25,000 by deploying K2 software. Access it now to learn how and find out what it can do for you.
Posted: 24 Nov 2014 | Premiered: 18 Jan 2013

K2

Enable software-defined security for software-defined infrastructure
sponsored by Intel Corporation
DATA SHEET: Check out this data sheet to explore a software-defined security solution that is designed to accompany a software-defined infrastructure.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Intel Corporation

Quality in the Cloud: Best Practices for ISVs
sponsored by Equinix
WHITE PAPER: Access this white paper to learn how ISVs can partner with hosting companies, establish criteria for selecting a hosting service, and get metrics for measuring hosting performance as it relates to cloud services. You'll get insight into how you can prepare to enter into the cloud market quickly and confidently.
Posted: 05 Nov 2014 | Published: 31 Dec 2011

Equinix

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement