Sort results by: Published date | Company name
Showing items 1-25

Improved Website Performance and Security Secrets Revealed [ Source: Alertsite ]

April 2010- Research shows that customers are won or lost on the Internet in just seconds.

Discover how you can immediately improve uptime and deliver the fastest possible web performance for your users.

The Wild, Wild Web: How to Ensure 360-Degree Border Security [ Source: MessageLabs, Symantec Hosted Services ]

April 2010- Web, email, and IM pose serious threats to the modern organization. Most organizations lack the necessary resources required to protect their borders from the level of threat stemming from multiple vectors. Whether authorized or unauthorized, uncontrolled use of public networks exposes organizations to risks that can compromise productivity, profitability, business continuity and customer trust. Accidental or deliberate data leakage, inappropriate use and regulatory non-compliance are very real dangers. Most organizations probably do not feel that ...

How Unauthorized Applications Impact Security and How You Can Take Back Control [ Source: Sophos ]

March 2010- A workforce, reared on social networking and mobile technologies, is bringing a different perspective to how computers are used within an organization. With a mindset that is highly tuned to sharing information with friends, employees are running unauthorized applications on their corporate-owned PCs unbeknownst to their IT departments. Although internet technologies like instant messaging (IM) can bring business value in helping employees communicate and work collaboratively, they also introduce a new level of risk that ...

MemoThis: A Virtual Sticky Note [ Source: MemoThis ]

January 2010- The exponential expansion of online information is causing consumers and professionals to spend too much time online. Our browser and search productivity tools have not caught up to our need for more power over the knowledge we find on the Internet. MemoThis lets users mash up their own comments and thoughts with published content. It's a virtual sticky note that you can post on any Web or portal page, anywhere, anytime. It lets you work ...

How to Offer the Strongest SSL Encryption [ Source: Verisign ]

July 2014- Learn how VeriSign SGC-enabled SSL Certificates can help improve site security and customer confidence in the free white paper, “How to Offer the Strongest SSL Encryption.” In this paper you will learn the differences between weak and strong encryption and what they mean for your site’s performance.

Estimating Cache Hit Rates From the Miss Sequence [ Source: Hewlett-Packard ]

January 2008- This paper published by HP considers the problem of inferring cache hit rates from observations of references that miss in the cache. In the Web context, this is the problem of inferring a browser’s cache hit rate by examining the requests that it issues to origin servers. The paper shows that a case of this problem can be solved. Specifically it considers a sequence of references to unit-sized objects generated by an LRU (Least ...

Synchronizing a Web Client Database: LocalCalendar and Google Calendar [ Source: Sun Microsystems ]

January 2008- Rich Internet Applications (RIAs) are becoming more and more popular as the capabilities available to internet clients increase. There is a growing demand for RIAs to be able to store rich, structured, searchable data on the same machine as the web browser, and to be able to synchronize this data with a centralized data store running behind the web server. This paper from Sun Microsystems describes the flow and components of a synchronization architecture using ...

Network Explorer Extensibility [ Source: Microsoft ]

January 2008- Network Explorer is the place in the Microsoft Windows Vista operating system for users to discover and use all of the network resources, including network devices and computers in the Local Area Network (LAN). From Network Explorer, users can see device-specific icons and properties and invoke device-specific actions. This paper describes how Network Explorer discovers a network device; displays a device-specific icon, actions, and properties; and launches a device-specific application. This paper provides information about ...

OWeB: A Framework for Offline Web Browsing [ Source: Microsoft ]

January 2008- Internet browsing has traditionally been dependent on the real-time network availability and speed. This dependency becomes a significant constraint when accessing the web over slow and intermittent networks. There is an inordinate delay in downloading the web pages and files and this results in an unpleasant browsing experience. Accessing large chunks of data, or streaming content across the web often incurs problems with latency, interruptions, and poor quality, at least where network connectivity is questionable. ...

Do Security Toolbars Actually Prevent Phishing Attacks? [ Source: Association for Computing Machinery ]

January 2008- This paper published by Association for Computing Machinery describes about the Security toolbars in a web browser that shows security-related information about a website to help users detect phishing attacks. The authors conducted two user studies of three security toolbars and other browser security indicators and found them all ineffective at preventing phishing attacks. The authors found that many subjects do not understand phishing attacks or realize how sophisticated such attacks can be.

SenseWeb: Browsing the Physical World in Real Time [ Source: Microsoft ]

January 2008- This paper published by Microsoft states that the Geo-centric web interface are useful to visualize spatially and geographically related data such as addresses, neighborhoods, weather, traffic, and so on. Desires to augment additional useful information to these interfaces have led people to create custom applications that overlay their own data on top of browsable maps. This paper envisions publishing and querying real-time data (e.g., from sensors) over such geo-centric web inter-faces. Existing solutions, although ...

Introduction to Mozilla Firefox [ Source: ICESoft ]

January 2008- This paper will cover the most accepted features and settings in Mozilla Firefox, a separate open-source browser developed by the makers of the Mozilla Suite (combination email and browser). The Download Manager is a feature of Firefox that allows one to track and manage one’s past and current file downloads. It is a handy way to escape the clutter of multiple downloading windows while still preserving access to download statistics. When one downloads a ...

Web Services for Genre Vocabularies [ Source: OCLC Online Computer Library Center ]

January 2008- This paper presents an approach for providing terminology Web services for prohibited vocabulary terms. Services are implemented within a service leaning framework. A set of investigational services for genre vocabularies is provided through the MS Office Research pane, a built-in feature of Internet Explorer (IE) when users have loaded MS Office 2003. Web browsers, such as Mozilla Firefox and Opera, also provide side-bars which could be used to deliver loosely-coupled Web services.

Thinix in the Hospitality Industry [ Source: R & D Industries ]

January 2008- Traditional approaches to provide Hotel guests with computers have been to provide a machine which typically runs Microsoft Windows for the guest. These Windows based computers are susceptible to computer viruses and Spyware. Windows based computers need constant attention and are easily misconfigured by hotel guests. While various security methods can be used to protect Windows based computers from misconfiguration, these can be easily bypassed by using special software. This white paper describes Thinix which ...

Automation and Customization of Rendered Web Pages [ Source: Association for Computing Machinery ]

January 2008- On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client will view the page, once delivered to the browser. This creates an opportunity for end-users who want to automate and customize their web experiences, but the growing complexity of web pages and standards prevents most users from realizing this opportunity. This white ...

A Better Web Browsing Experience With Firefox: Practical Workbook [ Source: University of Bristol ]

January 2008- This paper provides a practical introduction to the Firefox web browser. Firefox is a free application that allows to browse the World Wide Web. It is developed by an open-source organization called Mozilla and is available for Windows, Mac and Linux systems. Firefox is both more secure and more modern than Internet Explorer (IE), and it comes packed with user-friendly features IE lacks. The user will learn browsing the web using the Firefox tabbing function.

Open Source Delivers for Government Agencies a Handbook on Pilot Projects [ Source: Government of Malaysia ]

January 2008- This white paper is a handbook shares the success stories, experiences and benefits of the implementation of Open Source Software (OSS) in four pilot government agencies. The four pilot projects are part of the Malaysian Public Sector Open Source Initiative led by MAMPU. The pilot project for the Ministry of Finance (MoF) involved the upgrading of the Treasury Portal and development of the Economic Intelligence Database System (EIDS). The Treasury Portal and EIDS use PHP ...

Internet Basics [ Source: XCaliber Systems ]

January 2008- Browser is the vehicle one use to navigate the web. This paper describes browser applications and configurations. There are three leading web browser applications, and several other options. One’s choice depends on the preferences and experiences. Nowadays most people use one of the mainstream browsers: Internet Explorer, Mozilla, or the older Netscape. It also explains the pros and cons of these web browsers, recommended configurations and many more.

Upgrade to IBM Lotus Notes and Domino 7 Products: Announcing New Messaging and Collaboration Software to Help Enhance Productivity, Streamline Processes and Improve Responsiveness [ Source: IBM ]

January 2008- Lotus Notes and Domino 7 software products deliver a reliable, security-rich messaging and collaborative environment that can help companies enhance the productivity of people, streamline business processes and improve overall business responsiveness. Lotus Notes and Domino 7 software can help one improve availability, reliability, interoperability, integration and performance, and simplify administration. This combination of benefits can help one lower the Total Cost of Ownership (TCO) and optimize the return on investment.

Coding With Compassion - Giving Everyone Access to the Power to Know [ Source: SAS Institute ]

January 2008- This white paper offers specific SAS coding tips and demonstrate the value of different options in ODS and SAS/GRAPH output. The authors emphasize SAS 9 features, such as the SAS/GRAPH accessibility option to generate accessible Java graphs and the use of the HTML destination for ODS, to ensure that one generates the most accessible output possible. One can gain a better understanding of the organization’s legal and social responsibility for accessible web content ...

Improving Web Accessibility Through an Enhanced Open-Source Browser [ Source: IBM ]

January 2008- The accessibilityWorks project provides software enhancements to the Mozilla Web browser and allows users to control their browsing environment. This white paper discusses user controls that facilitate a number of adaptations that can greatly increase the usability of Web pages for a diverse population of users. In addition to transformations that change page presentation, innovations are discussed that enable mouse and keyboard input correction as well as vision-based control for users unable to use their ...

Improving the Usability of Web Browser Security [ Source: University of Pittsburgh ]

January 2008- SecureWeb sites use HTTPS, which layers HTTP over SSL or its standard equivalent, TLS. Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, the browser typically allows the user to view and install the certificate and connect to the site despite the verification failure. However, few users understand the risk of man-in-the-middle attacks and the principles ...

Exploring the Structure of Complex Software Designs: An Empirical Study of Open Source and Proprietary Code [ Source: President and Fellows of Harvard College ]

January 2008- This white paper reports data from a study that seeks to characterize the differences in design structure between complex software products. In particular, the authors use Design Structure Matrices (DSMs) to map the dependencies between the elements of a design and define metrics that allow to compare the structures of different designs. It also provides evidence that a tightly-coupled design can be adapted to meet this objective.

About Closed-Door Free/Libre/Open Source (FLOSS) Projects: Lessons From the Mozilla Firefox Developer Recruitment Approach [ Source: Creative Commons ]

January 2008- In this white paper the author presents five new arguments for why groups may wish to organize this way. The first argument is that developers simply do not have the disposable time to evaluate potential members. The next two arguments are based on self-selection-by setting tough entry requirements the project can ensure that it gets high quality and highly persistent programmers. The fourth argument is that expanding a group destroys the fun. The fifth argument ...

Use of SVG and ECMAScript Technology for E-Learning Purposes [ Source: ETH Zurich ]

January 2008- SVG (Scalable Vector Graphics) is a XML based markup language used to describe and integrate vector graphics, raster graphics and text. SVG is developed by the W3C web consortium as an official web standard, with the support of major computer graphics and mobile phone companies. The paper first summarizes SVG’s capabilities. The second part discusses strengths and weaknesses of the SVG approach and explain why SVG is a useful technology for e-learning purposes.

Next 25