Software  >   Systems Software  >   Programming Languages  >   Scripting Languages  >  

JScript

RSS Feed   
DEFINITION: JScript is a script language from Microsoft that is expressly designed for use within Web pages. It adheres to the ECMAScript standard and is basically Microsoft's equivalent to Netscape's earlier and more widely used JavaScript.
JScript Reports
151 - 175 of 710 Matches Previous Page  |  Next Page
Computer Weekly – 7 November 2017: The ethics of software development
sponsored by ComputerWeekly.com
EZINE: Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

ComputerWeekly.com

Computer Weekly: Counting the Real Cost of Financial Cyber Crime
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 11 Nov 2016 | Published: 15 Nov 2016

ComputerWeekly.com

Computer Weekly@50: What was happening in July
sponsored by ComputerWeekly.com
EBOOK: The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

ComputerWeekly.com

Connecting and Optimising SharePoint
sponsored by ComputerWeekly.com
ANALYST REPORT: SharePoint projects are "stalling" as user resistance rises, according to this report from independent information management analyst group AIIM.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

ComputerWeekly.com

Conquering the sys-admin challenge
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from Quocirca presents new data on how well organisations are able to automate their sys-admin procedures, manage the use of privilege and satisfy the requirements of auditors.
Posted: 29 Oct 2012 | Published: 29 Oct 2012

ComputerWeekly.com

Continuous Delivery of Business Value with Micro Focus Fortify
sponsored by Micro Focus
WHITE PAPER: Download this report to reveal how this software security system is changing the game for development and security teams at leading companies.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Continuous Integration and Delivery with Ansible
sponsored by Red Hat
WHITE PAPER: If your team is struggling to enable continuous integration and continuous deployment (CI/CD), it may be time to consider implementing an IT automation engine. Read on here to learn about an open source automation engine that could help you enable CI/CD with zero downtime.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Red Hat

Continuous Testing in Micro Focus
sponsored by Micro Focus_Infosys
WHITE PAPER: Download this guide for tips on how to achieve success with continuous testing, through a combination of process and technical enablers – from testing baked into user stories, to manual testing and automated infrastructure.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Micro Focus_Infosys

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now.
Posted: 07 Jan 2013 | Published: 08 Jan 2013

ComputerWeekly.com

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

ComputerWeekly.com

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

Concurrent Computing for SCA Applications: Achieving Scalability in a Service-oriented Application Environment
sponsored by Rogue Wave Software
WHITE PAPER: The SCA specifications define a programming model for assembling software services in a service-oriented architecture that offers great flexibility and agility.
Posted: 21 Jul 2008 | Published: 01 Jan 2007

Rogue Wave Software

Configuration and Change Management for IT Compliance and Risk Management
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements.
Posted: 08 Jan 2009 | Published: 01 Nov 2007

Tripwire, Inc.

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Configuration Management: What You Need to Know
sponsored by Cherwell
ESSENTIAL GUIDE: Now that IT is constantly increasing in complexity, IT professionals need to keep up with the rapid dynamics of the market. Access this e-guide to learn about the importance of a configuration management system and how to evaluate these systems to find the one that best meets your organization's IT needs.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

Cherwell

Converged Network, Storage and Compute Infrastructure: Are we there Yet?
sponsored by SearchNetworking.com
EBOOK: Access this expert e-guide to learn how you can make a converged network infrastructure a reality and achieve top efficiency.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchNetworking.com

Corporate Culture Can Determine ALM Software Choices
sponsored by SearchSoftwareQuality.com
EBOOK: Not all ALM platforms were made the same, so this expert handbook offers advice on how to select the right tools to suit the size and culture of your organization.
Posted: 02 Feb 2016 | Published: 29 Feb 2016

SearchSoftwareQuality.com

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Creating Digital Transformation Success and Implementing Cultural Change
sponsored by Comcast Business
EGUIDE: In this expert e-guide, we explore what it takes to get started with a successful digital transformation and take steps towards modernizing the various pieces of your organization's culture. Discover the increasingly important roles of big data, Agile, DevOps, talent management, and more.
Posted: 10 Mar 2017 | Published: 08 Mar 2017

Comcast Business

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Customer Perspectives on the Benefits of a Collaborative Process to Deliver Software Quality
sponsored by IBM
WHITE PAPER: This Hurwitz and Associates whitepaper shares the successes, challenges and future plans of three companies - Sogeti Group, Accident Compensation Corporation (ACC), and Scotiabank.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

Customer Relationship Management - Integration for a Customer Centric View
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper provides a valuable list of factors for executive management, IT decision makers and sales professionals to consider when planning a successful CRM integration project.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Sage (UK) Limited

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation
151 - 175 of 710 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement