Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Web Browsers

RSS Feed   
ALSO CALLED: Graphical Browsers, Text-based Browsers, Internet Browsers, World-Wide Web Browsers, Pull Technology Software, WWW Browsers, Browsers
DEFINITION: A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. The word "browser" seems to have originated prior to the Web as a generic term for user interfaces that let you browse (navigate through and read) text files online. Technically, a Web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make requests  … 

Web Browsers definition sponsored by SearchWinDevelopment.com, powered by WhatIs.com an online computer dictionary
Web Browsers Reports
1 - 25 of 35 Matches Previous Page  |  Next Page
Enterprise-Grade Barcode Scanning for Your Browser
sponsored by Scandit
PRODUCT REVIEW: Download this resource to discover a barcode scanner SDK for the web that delivers scanning technology to your HTML website or web application. Inside you'll learn how users can integrate barcode scanning into e-commerce platforms such as SAP Hybris and Salesforce Commerce Cloud.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

Scandit

Web Browser Security Features Make Attacks Harder
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

SearchSecurity.com

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Your Quick Reference Guide to HTTPS Everywhere
sponsored by DigiCert
WHITE PAPER: Recent changes to internet standards and web browsers favor websites using HTTPS. Here is your opportunity to learn more about HTTPS and its benefits. Plus, 3 tips to get you started with your transition.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

DigiCert

Automation Certificates: Control and Insights
sponsored by DigiCert
RESOURCE: An automated certificate service can help ensure that your SSL/TLS certificates never expire. Find out how else it can significantly help you.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

DigiCert

Enhancing Web App and Browser Security
sponsored by Citrix
WHITE PAPER: In a world where bad actors can find a point of infiltration even in a well-orchestrated defense, find out how you can improve browser and web app security.
Posted: 15 Jun 2018 | Published: 31 Jan 2018

Citrix

Demo: Secure Browsing in the Cloud
sponsored by Authentic8, Inc.
VIDEO: Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.
Posted: 02 Aug 2017 | Premiered: 21 Dec 2016

Authentic8, Inc.

The Requirements of a Secure Browser
sponsored by Authentic8, Inc.
VIDEO: Traditional web browsers weren't built with today's threats in mind, and the gaps in infrastructure are being exposed. In this brief video, learn the full requirements of a secure browser.
Posted: 02 Aug 2017 | Premiered: 09 Jun 2015

Authentic8, Inc.

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

Sync for Commvault Edge™
sponsored by Commvault
VIDEO: Watch this concise webcast to find out how one vendor's sync software can help you.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

Commvault

Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation
sponsored by Thawte Inc.
EGUIDE: In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

Thawte Inc.

Marel guarantees MS Lync & SharePoint performances to reduce travel costs
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: This case study take an in-depth look at how one manufacturing company was able to enhance their Microsoft Lync and SharePoint solutions to improve user experience and cut travel costs.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

IPANEMA TECHNOLOGIES

Executive Brief: OpenText Web Experience Management
sponsored by OpenText
WHITE PAPER: Building and maintaining a comprehensive website has recently become a primary area of focus for many organizations. This white paper outlines expectations and what you need to create a compelling and meaningful conversation between website, brand and user across a myriad of devices and platforms.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

OpenText

Single Source of Truth: A Guide for Real User Measurement in the Workplace
sponsored by SOASTA, Inc
WHITE PAPER: Inside this valuable resource, discover how, by measuring from the user's browser or app, real user management (RUM) tools can quantify the correlation between page load time and user engagement, and show where to optimize performance for more positive outcomes.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SOASTA, Inc

Web Browser Security Features Make Attacks Harder
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

Hamilton Health Sciences brings care to the bedside with Citrix Receiver
sponsored by Citrix
WHITE PAPER: Healthcare traditions are changing and physicians are adopting more mobile practices. Access this informative white paper to learn more about how adopting mobile devices can improve patient care and physician productivity.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

The Importance of Video and Video Monitoring in Today’s Business
sponsored by Encoding.com
EGUIDE: This e-guide shares information on the latest video codec technology and explains why business intelligence (BI) must grow to include processes that let IT teams find, examine, exploit, or delete video content.
Posted: 31 Jul 2012 | Published: 31 Jul 2012


Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER: This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

Qualys

Browser based access to Windows applications and desktops – AccessNow by Ericom
sponsored by Ericom Software
TRIAL SOFTWARE: Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device.
Posted: 28 Oct 2011 | Premiered: 28 Oct 2011

Ericom Software

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Handling Mobile Web Pages Better
sponsored by QUALCOMM Incorporated
EBOOK: In this white paper, find out how to get higher performance out of browser and JavaScript™ engines. Discover how to take advantage of Web Technologies optimizations to provide a user experience befitting the Truly Mobile Web.
Posted: 23 Jun 2011 | Published: 23 Jun 2011

QUALCOMM Incorporated
1 - 25 of 35 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement