- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Privileged Access Users in the Enterprise
- 5 Steps for Securing the Data Center: Why Traditional Security May Not Work
- The Right Way to Protect Against DDoS Attacks
- Case Study: Everbridge Manages Traffic and Security across Global Cloud Providers and Local Data Centers
January 2008- Within the last six months or so Mozilla Firefox has been taking the web by storm with their Spread Firefox campaign. This paper is Part I in a series completely on Firefox that help with initial setup of Firefox to specifics like advanced features, plugins, etc. and get one to switch over to Firefox instead of the standard Internet Explorer. The easiest thing with Firefox is the install. This paper is for the basic user ...
January 2008- Before standards were introduced or supported, web designers creatively used HTML to create the look and feel they desired. Unfortunately this meant that many sites would work in only one browser, thereby excluding some visitors, and made the sites tough to maintain and update. This paper attempts to explain what the standards are, why web sites should be standards compliant, and the business case for standards compliance.
January 2008- In this white paper the author explains the reason why Firefox became his favorite browser. It shows the power of tabbed browsing in Firefox that can be had by taking advantage of the functionality that comes loaded in the browser, as well as through the use of four tabbed browsing extensions. The tabbed browsing lets one open new web pages as tabs inside the browser window rather than opening a bunch of individual windows. Thus ...
January 2008- There was an open-source Mozilla browser before last fall - a suite of browser, e-mail client and other Components - but it was mainly a test bed for Netscape development. The Mozilla Foundation decided to replace the old suite with a stand-alone browser Firefox and an e-mail client called Thunderbird, which debuted in December. Firefox is the latest addition to a growing selection of Web browsers and has made impressive gains.
January 2008- The Open Source Community has two common X-Servers, multiple browsers, dozens of shells and window managers but just one omnipresent search engine is used in applications like Firefox and Google. It shows the controversy of diversity vs. Google. It tries to determine if the author should and could change things.
January 2008- The latest version of Firefox, an open source program, formerly Mozilla, and before that, Netscape Navigator, was released to popular acclaim near the end of 2004 from www.mozilla.com. Many people, tired of security problems and perpetual patching of Internet Explorer, have begun to make the switch to Firefox. The author found it an easy transition to import bookmarks, favorites, and other items, and set up housekeeping in Firefox.
January 2008- Mozilla Firefox is a Free/Libre/Open Source (FLOSS) browser supported by the Mozilla Foundation. This browser was recently released and has met with considerable success. It has been downloaded more than 20 million times and has already taken considerable market share from its prime competitor-Microsofts Internet Explorer. This paper published by Mozilla describes the efforts of 63000 volunteers that led to a community successfully competing with a powerful corporation. In this paper, the author also ...
January 2008- Website operators and visitors are both interested in effective communication of the privacy policies of a website. Automated translation of P3P policies into human readable form is a promising solution. P3P is a W3C-defined standard for publishing privacy policies in XML. This paper describes Privacy Fox, a plug-in for the Mozilla Firefox web browser that translates the P3P policy of the site being visited into two forms, a short privacy notice ...
January 2008- Depending on the application and other circumstances, DNS caching may affect how quickly users are re-directed to a backup server by Simple Failover. Of course one needs to compare this to the alternative: Without Simple Failover, as long as the main server is unavailable, NO users will be able to access the services. This paper from JH Software ApS provides a short introduction to how DNS caching works, how it is implemented by different applications, ...
January 2008- Web pages are often designed with a desktop screen in mind, i.e., they use multi-column layouts and/or are preformatted to a certain page width. On a small screen device, such as a PDA, such pages can be hard to read. If rendered in a desktop-like two-dimensional layout, such pages can require users to scroll horizontally while reading text. This paper from Microsoft presents collapse-to-zoom, a technique that addresses this issue by offering an ...
January 2008- The NCSA HDF team provides a Java application, HDFview, that implements a graphical browse and editor, which works with HDF4, HDF5 and has optional plug-ins for HDF-EOS, FITS, and netCDF3. In other work, the author investigated Client-Server approaches, include Java Remote Method Invocation, CORBA, and Web Services. This paper discusses investigations of how to implement a Web browser plug-in that can browse Hierarchical Data Format (HDF) files. The HDFView browser and other tools provide stand-alone ...
January 2008- The CmapTools software suite was designed to support collaboration and sharing among users. The CmapServer includes a WWW Server that delivers HTML versions of the Cmaps. Its client-server architecture allows users to copy or publish their Knowledge Models to CmapServers making them readily available to users through the CmapTools client, or to construct the Knowledge Models directly on a server. It can support Cmap-based websites. This paper published by Institute for Human and Machine Cognition (...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services