code

Results 351 - 375 of 473Sort Results By: Published Date | Title | Company Name
Published By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : 
brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence
    
BrightEdge
Published By: New Relic     Published Date: Jun 13, 2014
This eBook explores how to improve your software & business with modern APM tools.
Tags : 
new relic, social technologies, apm, application performance management
    
New Relic
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents, keyloggersmalvertising, trojan horse, extended validation, ev ssl certficates, botnet, denial of service, cybercriminals
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: APTX     Published Date: Nov 05, 2009
This technology white paper introduces the reader to an entirely new scheme for lossless audio compression called apt-X Lossless.
Tags : 
aptx, apt-x lossless, audio processing, audio codec
    
APTX
Published By: APTX     Published Date: Nov 05, 2009
This paper examines the key performance aspects of low bit rate audio codecs for the next generation of bandwidth-efficient digital wireless microphone systems that meet the future needs of live events.
Tags : 
aptx, bit-rate, wireless microphone, audio codec, spectrum, compression ratio
    
APTX
Published By: APTX     Published Date: Nov 05, 2009
Viable distribution of Multi-channel Audio-over-IP for Live and Interactive "Voice Talent" based Gaming using High-quality, Low-latency Audio Codec technology.
Tags : 
aptx, audio-over-ip, voice talent, interactive gaming, audio codec, compression, ip network, bandwidth, streaming audio
    
APTX
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Meet-me services like Blue Jeans® and Zoom® support only one model: a prescheduled, “meet-me” conference with long, numerical dial strings and access codes. They don’t offer a “connected experience.” You have to separately manage and integrate video systems, resulting in an inferior, disjointed user experience that is more challenging to manage. Meet-me models can’t match Lifesize. Everything else is a group meeting to which participants call in and wait for everyone else. There’s no directory dialing, no point-to-point calling, no presence status and no call escalation. The only thing consistent about meet-me services is that they copy the cumbersome user experience of the audio conferencing model—dial, enter code, enter ID, wait … Download now to learn why Lifesize Cloud is the ONLY solution you need!
Tags : 
lifesize, cloud, video, connected experience, video systems, meet-me model, software development, wireless, business technology
    
LifeSize, a division of Logitech
Published By: Viavi Solutions     Published Date: Jun 30, 2014
Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.
Tags : 
network instruments, http, troubleshooting, http status codes, web applications, it management, enterprise applications
    
Viavi Solutions
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management, data management
    
Cisco
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: Podium     Published Date: Dec 06, 2016
Getting your happiest customers to leave a review might seem difficult, but it’s easier than you might think. In our new ebook, Cracking the Code: Why online reviews matter to your business, we will show you how online reviews can improve local SEO, increase trust and loyalty with your customers, and ultimately boost your bottom line.
Tags : 
podium, customer insight, customer reviews, customer satisfaction
    
Podium
Published By: Progress Software     Published Date: Mar 12, 2014
This paper explores some of the practices most relevant to achieving success with PaaS, focusing on ways to identify how PaaS can be best utilized within the specifics of a given organization’s overall IT needs. Practices include understanding scalability and infrastructure aspects of PaaS deployment, the need for coding wisdom in otherwise “codeless” environments, integration with on-premise systems and other cloud-based IT assets, security and more.
Tags : 
progress software, paas, platform as a service, cloud, isv, platform infrastructure, development platform, enterprise adoption, software development, knowledge management, data management, data center
    
Progress Software
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Hold for copy
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
La signature de code s’impose plus que jamais comme un impératif incontournable sous l’impulsion de deux grandes tendances : 1) l’explosion des applications grand public sur les terminaux fixes et mobiles, et 2) la prolifération des logiciels malveillants (malwares).
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
La proliferación de malware y el boom de las aplicaciones de consumidor para dispositivos móviles y de escritorio hacen que la firma de código sea más importante que nunca.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Due trend rendono oggi la firma del codice più importante che mai: il boom delle applicazioni commerciali per i dispo-sitivi mobili e desktop e la proliferazione del malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Das Zusammentreffen zweier Trends macht Code Signing zur unerlässlichen Sicherheitsmaßnahme: die rasant steigende Anzahl an Mobilgeräte- und Desktopanwendungen auf dem Verbrauchermarkt und die zunehmende Verbreitung vonMalware
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Två trender gör kodsignering viktigare än någonsin: alla nya konsumentprogram för mobila och stationära enheter, samt alla sabotageprogram.
Tags : 
    
Symantec
Published By: Flashmaps     Published Date: Aug 16, 2011
Convert your databases into useful geospatial information in a snap! Interactive area maps of the world, USA, Canada, states, counties and more!
Tags : 
flash maps, interactive maps, real-estate maps, world map, city map, street map, us map, state map, county map, city map, web map, mapping solutions, zip code map, custom map, location map, territory map, area maps, db mapper, flashmaps, areaselector
    
Flashmaps
Published By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115, tpr
    
CBIZ
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
symantec, stuxnet, cyber-attack, security, certificate authority
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security
    
Symantec Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee