Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

World-Wide Web Browsers

RSS Feed    Add to Google    Add to My Yahoo!
World-Wide Web Browsers Reports
 
Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER: Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007

Information Builders

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Presentation Transcript: SEQUEL: The Triathlete of Data Access
sponsored by SEQUEL-Software
PRESENTATION TRANSCRIPT: This transcript describes  how data access supports System i operations. Discover the key features and functions of a business information tool that caters to 3 System i user needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SEQUEL-Software

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement