Improved Website Performance and Security Secrets Revealed
[ Source: Alertsite ]
April 2010-
Research shows that customers are won or lost on the Internet in just seconds.
Discover how you can immediately improve uptime and deliver the fastest possible web performance for your users.
The Wild, Wild Web: How to Ensure 360-Degree Border Security
[ Source: MessageLabs, Symantec Hosted Services ]
April 2010-
Web, email, and IM pose serious threats to the modern organization. Most organizations lack the necessary resources required to protect their borders from the level of threat stemming from multiple vectors. Whether authorized or unauthorized, uncontrolled use of public networks exposes organizations to risks that can compromise productivity, profitability, business continuity and customer trust. Accidental or deliberate data leakage, inappropriate use and regulatory non-compliance are very real dangers.
Most organizations probably do not feel that ...
How Unauthorized Applications Impact Security and How You Can Take Back Control
[ Source: Sophos ]
March 2010-
A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments.
Although internet technologies like instant messaging (IM) can bring business value in helping employees communicate and work collaboratively, they also introduce a new level of risk that ...
MemoThis: A Virtual Sticky Note
[ Source: MemoThis ]
January 2010-
The exponential expansion of online information is causing consumers and professionals to spend too much time online. Our browser and search productivity tools have not caught up to our need for more power over the knowledge we find on the Internet. MemoThis lets users mash up their own comments and thoughts with published content. It's a virtual sticky note that you can post on any Web or portal page, anywhere, anytime. It lets you work ...
How to Offer the Strongest SSL Encryption
[ Source: VeriSign ]
July 2008-
Learn how VeriSign SGC-enabled SSL Certificates can help improve site security and customer confidence in the free white paper, “How to Offer the Strongest SSL Encryption.” In this paper you will learn the differences between weak and strong encryption and what they mean for your site’s performance.
Estimating Cache Hit Rates From the Miss Sequence
[ Source: Hewlett-Packard ]
January 2008-
This paper published by HP considers the problem of inferring cache hit rates from observations of references that miss in the cache. In the Web context, this is the problem of inferring a browsers cache hit rate by examining the requests that it issues to origin servers. The paper shows that a case of this problem can be solved. Specifically it considers a sequence of references to unit-sized objects generated by an LRU (Least ...
Synchronizing a Web Client Database: LocalCalendar and Google Calendar
[ Source: Sun Microsystems ]
January 2008-
Rich Internet Applications (RIAs) are becoming more and more popular as the capabilities available to internet clients increase. There is a growing demand for RIAs to be able to store rich, structured, searchable data on the same machine as the web browser, and to be able to synchronize this data with a centralized data store running behind the web server. This paper from Sun Microsystems describes the flow and components of a synchronization architecture using ...
Network Explorer Extensibility
[ Source: Microsoft ]
January 2008-
Network Explorer is the place in the Microsoft Windows Vista operating system for users to discover and use all of the network resources, including network devices and computers in the Local Area Network (LAN). From Network Explorer, users can see device-specific icons and properties and invoke device-specific actions. This paper describes how Network Explorer discovers a network device; displays a device-specific icon, actions, and properties; and launches a device-specific application. This paper provides information about ...
OWeB: A Framework for Offline Web Browsing
[ Source: Microsoft ]
January 2008-
Internet browsing has traditionally been dependent on the real-time network availability and speed. This dependency becomes a significant constraint when accessing the web over slow and intermittent networks. There is an inordinate delay in downloading the web pages and files and this results in an unpleasant browsing experience. Accessing large chunks of data, or streaming content across the web often incurs problems with latency, interruptions, and poor quality, at least where network connectivity is questionable. ...
Do Security Toolbars Actually Prevent Phishing Attacks?
[ Source: Association for Computing Machinery ]
January 2008-
This paper published by Association for Computing Machinery describes about the Security toolbars in a web browser that shows security-related information about a website to help users detect phishing attacks. The authors conducted two user studies of three security toolbars and other browser security indicators and found them all ineffective at preventing phishing attacks. The authors found that many subjects do not understand phishing attacks or realize how sophisticated such attacks can be.