Client Browser ProgramWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Client Browser Program returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Security Monitoring
 •   Web Browsers
 •   Enterprise Systems Management
 •   Content Delivery Networks/ Web Application Acceleration
 •   Application Management and Maintenance
 •   Application Security
 •   Business Intelligence Solutions
 •   Website Design and Development
 •   Enterprise Performance Management/ Balanced Scorecard

Related Searches
 •   Client Browser Backup
 •   Client Browser Objectives
 •   Client Script
 •   Client Software
 •   Compare Client Browser Program
 •   Example Client Browser
 •   Issues With Client
 •   Pos Client Browser Program
 •   Report Client Browser Program
 •   Reports Client
Advertisement

ALL RESULTS
1 - 25 of 447 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software. 
(WHITE PAPER) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft. 
(WHITE PAPER) READ ABSTRACT |

Load Testing for Web 2.0: Simplifying Performance Validation for Rich Internet Applications by Hewlett-Packard Company

August 2008 - (Free Research)
While rich next generation applications promise a radically improved customer experience, they also have the potential to overwhelm your servers. This paper examines a set of sophisticated tools for load testing your new high -powered apps. 
(WHITE PAPER) READ ABSTRACT |

jQuery on Rails (The Real Ones) by The Ajax Experience

January 2009 - (Free Research)
The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users. 
(PODCAST) READ ABSTRACT |

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

The Impact of AJAX on the Network by F5 Networks

March 2007 - (Free Research)
Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies. 
(WHITE PAPER) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Assure High Performance: Optimizing Web Applications in a Web 2.0 World by Gomez

September 2009 - (Free Research)
Faced with rising customer expectations and increasing competitive pressures, Website managers are applying new technologies. In this paper, Gomez will address why traditional “Web page” monitoring is insufficient, how new demands on client-side computing change the performance game, and what the return of the browser wars means for your business. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Rich Internet Applications: Design, Measurement, and Management Challenges by Keynote Systems

January 2006 - (Free Research)
This white paper details the evolution of traditional Web pages and applications, discussing the defining attributes of the emerging class of Rich Internet Applications (RIAs). 
(WHITE PAPER) READ ABSTRACT |

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

WebSphere Application Server Feature Pack for Web 2.0 by IBM

June 2008 - (Free Research)
This white paper explores methods for improving the development of Ajax-based applications and Web 2.0 to SOA connectivity. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Offline SharePoint Solution by Colligo Networks Inc.

May 2011 - (Free Research)
SharePoint is quickly becoming the centerpiece of collaboration for business processes in many top corporations. However, SharePoint only works when users are “online." This white paper examines the typical requirements for offline access in a number of scenarios and SharePoint site configurations. 
(WHITE PAPER) READ ABSTRACT |

Managed SSL VPN Remote Access by Virtela Communications, Inc.

March 2008 - (Free Research)
Virtela's SSL VPN Remote Access Services provide end-users the security of a completely encrypted network with the flexibility to access resources from any SSL enabled browser. 
(WHITE PAPER) READ ABSTRACT |

Oracle Application Express Overview 3.0 by Oracle Corporation

June 2007 - (Free Research)
This paper describes the benefits, architecture and features of Oracle Application Express and how it can help you quickly develop web deployed reporting and data entry applications on consolidated data in an Oracle database. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Desktop Transfer Client: Exchange Files with Any Trading Partner by GlobalScape

May 2014 - (Free Research)
In this white paper, explore a desktop file transfer solution that only requires Internet connection and offers increased flexibility in file sharing without added costs. 
(WHITE PAPER) READ ABSTRACT |

Site visit programs fuel outsourcing success by Hewlett-Packard Limited

October 2013 - (Free Research)
Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program. 
(WEBCAST) READ ABSTRACT |

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks by SearchSecurity.com

June 2011 - (Free Research)
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them. 
(EGUIDE) READ ABSTRACT |

Essential Guide to API Management and Application Integration by SearchBusinessAnalytics

November 2013 - (Free Research)
Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the technology, and key terms developers need to know. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Protecting Against the New Wave of Web Threats by BlueCoat

January 2009 - (Free Research)
This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings. 
(ANALYST REPORT) READ ABSTRACT |

Dell Deployment Design and Implementation by Dell, Inc. and Microsoft Windows 7

October 2009 - (Free Research)
The Dell Project and Program Management approach enables the alignment of all elements of a client deployment. This standardized and easy-to-understand framework can be tailored as necessary to complement and integrate with existing customer processes. 
(DATA SHEET) READ ABSTRACT |

What’s New in VMware ThinApp 4.6 by VMware, Inc.

April 2011 - (Free Research)
It is important to remember that Web-based applications pose compatibility issues similar to native applications because of the underlying technology components used to create and run them. Learn how utilizing the right software allows you to ensure legacy application compatibility with each successive browser or operating system update. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 447 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts