Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Text-based Browsers

RSS Feed    Add to Google    Add to My Yahoo!
Text-based BrowsersReports
 
CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012


Browser based access to Windows applications and desktops – AccessNow by Ericom
sponsored by Ericom Software
TRIAL SOFTWARE: Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device.
Posted: 28 Oct 2011 | Premiered: 28 Oct 2011

Ericom Software

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Thawte Inc.

Single Source of Truth: A Guide for Real User Measurement in the Workplace
sponsored by SOASTA, Inc
WHITE PAPER: Inside this valuable resource, discover how, by measuring from the user's browser or app, real user management (RUM) tools can quantify the correlation between page load time and user engagement, and show where to optimize performance for more positive outcomes.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SOASTA, Inc

Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

Marel guarantees MS Lync & SharePoint performances to reduce travel costs
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: This case study take an in-depth look at how one manufacturing company was able to enhance their Microsoft Lync and SharePoint solutions to improve user experience and cut travel costs.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

IPANEMA TECHNOLOGIES

Sync for CommVault Edge™
sponsored by CommVault
VIRTUAL ENVIRONMENT: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

CommVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement