1,077 Results for:HTML
- Sort by:
LMS vs. CMS: What's the difference?
23 Aug 2023A CMS can fulfill general content publishing, editing and storage needs, while an LMS is better suited to a more specific HR and employee-oriented use case. Read More
How to use Nmap to scan a network for documentation
15 Dec 2022Nmap might be more common for security tasks, but it's also useful for network documentation and inventory. Follow these best practices to make the most of Nmap scan results. Read More
How to revert a Git commit: A simple example
01 Dec 2021The git revert command is commonly misunderstood. In this quick tutorial, we will show you exactly how the command works and how to perform a simple undo in your repo. Read More
7 top business continuity certifications to consider in 2024
05 Feb 2024Organizations can bolster and validate the expertise of their IT teams with a variety of certifications. There are several options aimed at business continuity professionals. Read More
A quick breakdown of Postman vs. Insomnia
18 Aug 2023Does your organization need the fully loaded capabilities of Postman or the lightweight implementation style offered by Insomnia? Read this quick breakdown to get the picture. Read More
Infor new developer portal: A place to build ERP apps ‘upon’
05 Oct 2023It’s always important to define the level at which an enterprise software vendor operates. While some tech companies offer a service, some offer a suite, others specialise in an application (or set ... Read More
Architecting beyond microservices and monoliths
29 Sep 2023A recent architectural change tied to Amazon's Prime Video service could help enterprise application teams understand their own microservices vs. monolithic architecture choices. Read More
Simple Ajax file upload with pure JavaScript example
27 Dec 2021Do you need to perform an Ajax file upload with pure JavaScript? This example lays out the steps to accomplish an Ajax file upload without the need for a JavaScript library like jQuery or Dojo. Read More
Threat researchers dissect anatomy of a Royal ransomware attack
04 Apr 2023Trellix researchers share the inside track on a Royal ransomware attack that hit one of its customers in late 2022 Read More
Researchers discover zero-day Microsoft vulnerability in Office
31 May 2022Malicious Word documents have been used to invoke a previously undisclosed vulnerability in Microsoft Office without user interaction through Windows utility functions Read More