Web NewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Web New returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Data Security
 •   Security Monitoring
 •   Web Services
 •   Application Security
 •   Service Oriented Architecture (SOA)
 •   Software Configuration Management (SCM)
 •   Vulnerability Assessment
 •   Rapid Application Development (RAD)

Related Searches
 •   Expert Web New
 •   Manufacturing Web New
 •   Templates Web
 •   Web Function
 •   Web New Events
 •   Web New Firm
 •   Web New Missouri
 •   Web New Monitor
 •   Web New View
 •   Web Payment
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Exploring new web browser security capabilities by SearchSecurity.com

October 04, 2012 - (Free Research)
New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset. 
(WHITE PAPER) READ ABSTRACT |

Controlling Web 2.0 Applications in the Enterprise by Fortinet, Inc.

July 29, 2011 - (Free Research)
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats. 
(WHITE PAPER) READ ABSTRACT |

Beating the Browser Wars: How to Win the Battle for Web Performance by Gomez

August 03, 2009 - (Free Research)
The war of the browsers is in full swing and we are stuck in the middle. This paper offers practical advice that can help you survive and even prevail in this combative environment. Read this paper to learn everything you need to know about the browser wars and how to survive them. 
(WHITE PAPER) READ ABSTRACT |

Load Testing 2.0 - The Next Generation of Load Testing for the Web 2.0 World by Gomez

July 09, 2009 - (Free Research)
Read this paper to learn why Load Testing 2.0 solutions are needed and who benefits. Learn best practices to get business value out of advanced load testing features, the limits of load testing 1.0 solutions, how today's approach complements existing 1.0 solutions, and what factors are important for selecting successful Load Testing 2.0 solutions. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl by Oracle Corporation

March 01, 2009 - (Free Research)
This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl. 
(WHITE PAPER) READ ABSTRACT |

Securing the Borderless Enterprise by Websense, Inc.

February 04, 2010 - (Free Research)
A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

StorageConsole® Backup Manager 6.5 - What's New by APTARE

July 2007 - (Free Research)
APTARE StorageConsole for Backup Manager provides detailed reporting for HP Data Protector 5.5 and 6.0. 
(DATA SHEET) READ ABSTRACT |

The New Language of Business: SOA and Web 2.0. Download a complimentary chapter by IBM

October 2007 - (Free Research)
Sandy Carter, Vice President of SOA and WebSphere Strategy, IBM Corporation, takes readers through a specific roadmap on how, where, when, and why to embrace a Service Oriented Architecture (SOA) strategy in her new book. 
(WHITE PAPER)

SQL Compatibility in DB2 9.7-- From triggers to object enhancements: A demonstration of the new PL/SQL compatibility features by IBM

September 2010 - (Free Research)
This article overviews the new PL/SQL compatibility features in IBM DB2 software version 9.7, making it easier to adopt and allowing you to take advantage of its autonomic and high-performance characteristics.  
(WHITE PAPER) READ ABSTRACT |

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security

October 2009 - (Free Research)
Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively. 
(WHITE PAPER) READ ABSTRACT |

Growing Market Share in a Highly Competitive Financial Services Industry by Keynote Systems

January 2004 - (Free Research)
Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Accelerate Innovation & Productivity with Rapid Prototyping and Development: Model New Ideas, Land More Business, and Control Costs by Attivio, Inc.

February 2010 - (Free Research)
This paper discusses how a new generation of platforms in the application stack is designed to both deliver a specific layer of functionality and enable rapid prototyping, allowing development teams to focus their efforts on the value they add and gain time for more innovation. 
(WHITE PAPER) READ ABSTRACT |

Advanced Encryption Standard New Instructions by Dell, Inc. and Intel®

May 2010 - (Free Research)
Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results. 
(WHITE PAPER) READ ABSTRACT |

SOFTWARE TESTING: New software testing technologies bring new challenges by SearchSoftwareQuality.com

March 2009 - (Free Research)
This first issue of SearchSoftwareQuality.com's Software Testing E-zine covers two new technology areas - virtualization and rich Internet applications (RIAs) - that are changing software testing approaches and presenting new challenges. 
(EZINE)

Collaboration to innovation: Leveraging Web 2.0 to Accelerate New Service Ideas by IBM

July 2007 - (Free Research)
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation. 
(WHITE PAPER) READ ABSTRACT |

Web Filtering: An Essential Part of a Consolidated Security System by Fortinet, Inc.

July 2011 - (Free Research)
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 PDF Slides by KnowledgeStorm Webinars (E-mail this company)

February 2007 - (Free Research)
View the slides presented in the "New Research: How to Improve Your B2B Email Marketing Results in 2007" Webcast and find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. 
(ANALYST REPORT) READ ABSTRACT |

Podcast - Emerging Media Series: Online Video, Social Networks and Wikis by KnowledgeStorm, Inc (E-mail this company)

November 2006 - (Free Research)
This podcast, the third in a series of studies examining the impact that emerging online media have on B2B technology marketing, shows how three mainstays of the Web 2.0 culture are evolving into B2B information delivery tools: Online video, Social networks and Wikis. 
(PODCAST) READ ABSTRACT |

Emerging Media Series: Online Video, Social Networks and Wikis by KnowledgeStorm, Inc (E-mail this company)

November 2006 - (Free Research)
This report, the third in a series of studies examining the impact that emerging online media have on B2B technology marketing, shows how three mainstays of the Web 2.0 culture are evolving into B2B information delivery tools: Online video, Social networks and Wikis. 
(ANALYST REPORT) READ ABSTRACT |

Configuration Cheat Sheet for the New vSphere Web Client by Global Knowledge

January 2014 - (Free Research)
Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client. 
(WHITE PAPER) READ ABSTRACT |

E-Book: SOA: Technical Opportunities, Social Challenges by Progress

February 2010 - (Free Research)
In this paper you will learn how SOA can directly influence the success of your business, which will result from your business’ ability to participate in these new, more dynamic, federated communities. Read on to learn how social orientation is driving both new SOA technology needs and management changes in how technology is delivered and governed. 
(EBOOK) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts