Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Text-based Browsers

RSS Feed    Add to Google    Add to My Yahoo!
Text-based BrowsersReports
 
Sync for CommVault Edge™
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

CommVault Systems, Inc.

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Thawte Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012


Presentation Transcript: SEQUEL: The Triathlete of Data Access
sponsored by SEQUEL-Software
PRESENTATION TRANSCRIPT: This transcript describes  how data access supports System i operations. Discover the key features and functions of a business information tool that caters to 3 System i user needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SEQUEL-Software

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Handling Mobile Web Pages Better
sponsored by QUALCOMM Incorporated
EBOOK: In this white paper, find out how to get higher performance out of browser and JavaScript™ engines. Discover how to take advantage of Web Technologies optimizations to provide a user experience befitting the Truly Mobile Web.
Posted: 23 Jun 2011 | Published: 23 Jun 2011

QUALCOMM Incorporated

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement