Unwanted PopUp Ads: Intrusive Internet Advertisements

Unwanted pop-up ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of pop-up ads, losses they cause, how they work, and suggests key features that a good pop-up ad filter software should have.

Featured Software Research:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP. Read More

Case Study: Pandora

Pandora is an Internet radio service that needed an agile, sustainable platform for future growth. So Pandora moved its entire IT infrastructure to the cloud, and using FinancialForce accounting and human capital management (HCM) solutions, the company achieved dramatic results. Read More

Retail Retold: How the Internet of Things Is Evolving Omnichannel Retail

Most merchants and consumers have adjusted to the multi-device, multichannel environment known as omnichannel retailing. But there are real challenges that the omnichannel environment brings to the retail industry, even before considering how the Internet of Things (IoT) will amplify the complexity. P.J. Jakovljevic and Raluca Druta report on how the IoT is altering the retail world. Read More

You may also be interested in these related documents:

Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)?

  • Source: Eset
  • Written By:
  • Published:
Determining when to classify a program as being either unwanted or unsafe can be particularly challenging, because a researcher has to look not just at what a program does, but what the intent is behind it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat. Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

Building a Business Case for Enterprise Spyware Protection

It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity. Read More
 
comments powered by Disqus