Pull Technology Software Reports

Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Single Source of Truth: A Guide for Real User Measurement in the Workplace
sponsored by SOASTA, Inc
WHITE PAPER: Inside this valuable resource, discover how, by measuring from the user's browser or app, real user management (RUM) tools can quantify the correlation between page load time and user engagement, and show where to optimize performance for more positive outcomes.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SOASTA, Inc

Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER: Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007

Information Builders

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

All resources sponsored by Encoding.com

Presentation Transcript: SEQUEL: The Triathlete of Data Access
sponsored by SEQUEL-Software
PRESENTATION TRANSCRIPT: This transcript describes  how data access supports System i operations. Discover the key features and functions of a business information tool that caters to 3 System i user needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SEQUEL-Software

Browser based access to Windows applications and desktops – AccessNow by Ericom
sponsored by Ericom Software
TRIAL SOFTWARE: Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device.
Posted: 28 Oct 2011 | Premiered: 28 Oct 2011

Ericom Software

Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.