Visualizing Web Sessions: Improving Web Browser History by a Better

Total Page:16

File Type:pdf, Size:1020Kb

Visualizing Web Sessions: Improving Web Browser History by a Better ii Visualizing Web Sessions: Improving Web Browser History by a Better Understanding of Web Page Revisitation and a New Session- and Task-Based, Visual Web History Approach Matthias Mayer 2007 University of Hamburg ii Universität Hamburg Department Informatik University of Hamburg Department of Informatics Dissertation zur Erlangung des Grades des Doktors der Naturwissenschaften, eingereicht am Department Informatik der Universität Hamburg. Dissertation in the Department of Informatics submitted to the faculty in partial fulfillment of the requirements for the degree of »Doctor rerum naturalium« at the University of Hamburg. Gutachter | Reviewers: Prof. Dr. Benjamin B. Bederson, University of Maryland, USA Prof. Dr. Horst Oberquelle, Universität Hamburg, Deutschland Prof. Dr. Christopher Habel, Universität Hamburg, Deutschland Tag der Disputation | day of disputation: 12. Dezember 2007 iii Widmung | Dedication Meiner Mutter Esther, meinem Vater Karl, meiner Schwester Gabriele. In großer Dankbarkeit. I am grateful to my mother, Esther, my father, Karl, my sister, Gabriele. iv Zusammenfassung Bei der Benutzung des World Wide Web spielen verschiedene Arten des Wiederbe- suchs von Webseiten (Revisit) eine wesentliche Rolle. Kurzzeit-Revisits entstehen häufig beim Explorieren von Websites und von Suchergebnis-Listen. Mittelfristig entstehen Revisits vorwiegend durch die Wiederbenutzung bevorzugter Werkzeuge und durch das Beobachten von Seiten, deren Inhalt sich häufig ändert. Langzeit- Revisits entstehen vor allem durch das erneute Lesen spezifischen Inhalts nach eini- ger Zeit. Die heute verfügbaren History-Werkzeuge wie der Zurück-Knopf (Back Button), Lesezeichen (Bookmarks), Verlauf (History List) und die automatische Vervollständigung einer Adresse (Auto-Complete) bilden ein heterogenes Umfeld unterschiedlichster Ansätze, die alle ihre eigenen Methoden des Zugriffs auf die persönliche Web-History bieten und mit den verschiedensten Benutzungsschnitt- stellen ausgestattet sind. Jedes dieser Werkzeuge besitzt charakteristische, teilweise erhebliche Schwächen. Bestehende Vorschläge zur verbesserten History-Unter- stützung schaffen teilweise Abhilfe, bringen aber jeweils neue Probleme mit sich. Dies führt zu der gegenwärtigen Situation, in der eine angemessene, integrative History-Unterstützung noch immer fehlt. Die vorliegende Arbeit analysiert den Status Quo des Web bezüglich Naviga- tion und Wiederbesuch. Sie vergleicht Vor- und Nachteile gegenwärtiger und vorge- schlagener History-Werkzeuge. Auf Grundlage dieser Erkenntnisse wird ein neuer Ansatz für ein integrierendes Web-History Werkzeug vorgestellt – der Session- Graphs Ansatz. Dabei wird der Pfad des Benutzers als animierter, interaktiver Graph visualisiert, wodurch eine Verarbeitung vorwiegend auf perzeptueller anstatt auf kognitiver Ebene ermöglicht wird. Das Layout der Graphen wird automatisch be- rechnet, um möglichst charakteristische visuelle Formen zu schaffen, die eine Wie- dererkennbarkeit auf Sitzungsebene aber auch auf Ebene einzelner Knoten gewähr- leisten. Die gesamte History eines Benutzers wird entsprechend einzelner Sitzungen unterteilt, so dass der Umfang einer Visualisierung begrenzt bleibt. Der Benutzer kann das Layout der Graphen manuell nach seiner Vorstellung ändern. Die einzel- nen Sitzungs-Visualisierungen können nach übergeordneten Aufgaben organisiert und archiviert werden. Dadurch berücksichtigt das vorgestellte Verfahren im Gegen- satz zu anderen existierenden und vorgeschlagenen Ansätzen auf konzeptueller E- bene bereits die Skalierbarkeit hinsichtlich wachsender Histories. Eine prototypische Realisierung des Ansatzes in Java, basierend auf dem Jazz-Grafik-Toolkit und dem Scone Framework für Web Erweiterungen, wurde ent- wickelt und in zwei kontrollierten Experimenten und einer Langzeitstudie verwen- det, um wesentliche Aspekte des Ansatzes zu evaluieren. Zusätzlich wurden beste- hende, teilweise überholte Einsichten bezüglich Navigation und Wiederbesuch im Web zusammen mit drei Kollegen in einer Langzeit-Click-Stream-Studie vertieft und auf den neuesten Stand gebracht. Diese Analysen bilden eine solide Grundlage zur Diskussion und weiteren Verbesserung der vorgestellten Konzepte. v Abstract When people use the World Wide Web, they show various forms of web page revisi- tation.1 In the short-term, web pages are revisited during the exploration of various areas of a website and while following different links of a search results list. In the medium term, revisits occur when people reuse their favorite web-based services or when they observe modifications of well-known frequently updated pages. Long- term revisits mainly occur when specific content is reviewed after considerable time. Current history tools such as the back button, bookmarks, history list, and query autocompletion build a heterogeneous mixture of different approaches, all with different kinds of history access and interfaces. Each tool shows unique and often severe shortcomings. Existing suggestions for improving history support overcome some of these shortcomings, but introduce new ones. An appropriate, integrative history support, therefore, is still missing. This dissertation analyzes the current situation of navigation and revisitation on the web. It outlines and compares current and suggested history tools, as well as their advantages and disadvantages. Based on these insights, a new visual approach for an integrative history tool is presented – the SessionGraphs approach. It visual- izes the user's path as an animated, interactive graph, utilizing perceptual abilities and recognition instead of recall. Session borders are used to subdivide the visual history into items of reasonable, manageable size. A session is laid out automatically with the goal of maximizing the recognizability of the entire session's graph, as well as of the single nodes contained within it. The resulting characteristic visual shapes can be manually reshaped on demand. The user can then organize the visualizations according to the tasks he or she is working on. Thus, this approach provides a con- ceptual strategy to scale with growing histories – an important issue, which is not explicitly addressed by other existing and suggested approaches. A prototypical implementation in Java, based on the Jazz Graphics Toolkit and the Scone framework for web enhancements, is used to evaluate the approach in two controlled experiments and a longitudinal case study. Existing and partly out- dated insights about navigation and revisitation behavior on the current web with- out additional history support are updated and deepened in a longitudinal client side clickstream study, executed together with three colleagues. These analyses and evaluations provide a thorough base for the discussion and further improvement of the presented approach. 1 From now on the term web will be used instead of World Wide Web and refers to all objects that can be accessed with a common web browser, as described on page 259. vi Acknowledgements The presented work is the result of productive collaborations and the unremitting scholary and emotional support of great colleagues and friends. My deep gratitude is with all of them. I thank Peter Schefe for motivating me to start this venture, for his support and guidance along the way. I thank Ben Bederson and Ben Shneiderman for their invitation to an extremely fruitful residence at the Human-Computer Interaction Lab (HCIL) at the University of Maryland, for their excellent support, affectionate reception, and encouragement to continue this work. I would like to thank Ben Bederson in particular, for his knowledgeable, thoughtful advice related to pro- gramming, evaluation, and research direction, and his extraordinary hospitality. I thank Horst Oberquelle and Christopher Habel of the Department of In- formatics at the University of Hamburg for their continuous support, including all things organizational, and for supporting me in carrying through. I especially thank my friend and colleague, Harald Weinreich, who read the whole thesis – partly more than once, for his passionate scientific collaboration and precious feedback. My gratitude is also with Hartmut Obendorf and Eelco Herder for their great coopera- tion. I thank my colleagues Ruth Meyer, Björn Gehlsen, Holger Mügge, and Ralf Bachmann for making work and research a joyful experience. I thank all my former students and participants who contributed to this project, especially Volkert Jürgens, Torsten Hass, Frank Wollenweber, and the highly helpful and skilled people at the HCIL, in particular Jesse Grosjean, Lance Good, Harry Hochheiser, Hilary Browne, Anne Rose, and Catherine Plaisant. I appreciate the contributions of Shaun Kaasten and Gene de Lisa, and the discussions with Yuri Engelhardt. I thank the great librarians of the Department of Informatics, the administrative and computer staff, and the service team. Last, but not least, I would like to thank my mother, my father, my sister Gabriele Sperling, and my friends for their deep encouragement, love, and patience through all the years that brought me to this point in time. Especially, I thank Su- sanne Reizlein, Frank Misiak, Jan Heise, Inga Wellmann, Nina Hansen, Luise Pal- ace, the people @ futuretank, and Ursula McKnight for her great corrections. I thank the people at Haus 73, Pony Bar, and Unter den Linden for the wonderful environments they create, their smiles, and their vital soya latte. Thank you! vii Figure 2-1: “Depicting the Mesh” – web visualization by the author,
Recommended publications
  • Microsoft's Internet Exploration: Predatory Or Competitive?
    Cornell Journal of Law and Public Policy Volume 9 Article 3 Issue 1 Fall 1999 Microsoft’s Internet Exploration: Predatory or Competitive Thomas W. Hazlett Follow this and additional works at: http://scholarship.law.cornell.edu/cjlpp Part of the Law Commons Recommended Citation Hazlett, Thomas W. (1999) "Microsoft’s Internet Exploration: Predatory or Competitive," Cornell Journal of Law and Public Policy: Vol. 9: Iss. 1, Article 3. Available at: http://scholarship.law.cornell.edu/cjlpp/vol9/iss1/3 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Journal of Law and Public Policy by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. MICROSOFT'S INTERNET EXPLORATION: PREDATORY OR COMPETITIVE? Thomas W. Hazlettt In May 1998 the U.S. Department of Justice ("DOJ") accused Microsoft of violatirig the Sherman Antitrust Act by vigorously compet- ing against Netscape's Navigator software with Microsoft's rival browser, Internet Explorer. The substance of the allegation revolves around defensive actions taken by Microsoft to protect the dominant po- sition enjoyed by Microsoft's Windows operating system. The DOJ's theory is that, were it not for Microsoft's overly aggressive reaction to Netscape, Navigator software would have been more broadly distributed, thus enabling competition to Windows. This competition would have come directly from Java, a computer language developed by Sun Microsystems and embedded in Netscape software, allowing applications to run on any underlying operating system.
    [Show full text]
  • Link ? Rot: URI Citation Durability in 10 Years of Ausweb Proceedings
    Link? Rot. URI Citation Durability in 10 Years of AusWeb Proceedings. Link? Rot. URI Citation Durability in 10 Years of AusWeb Proceedings. Baden Hughes [HREF1], Research Fellow, Department of Computer Science and Software Engineering [HREF2] , The University of Melbourne [HREF3], Victoria, 3010, Australia. [email protected] Abstract The AusWeb conference has played a significant role in promoting and advancing research in web technologies in Australia over the last decade. Papers contributed to AusWeb are highly connected to the web in general, to digital libraries and to other conference sites in particular, owing to the publication of proceedings in HTML and full support for hyperlink based referencing. Authors have exploited this medium progressively more effectively, with the vast majority of references for AusWeb papers now being URIs as opposed to more traditional citation forms. The objective of this paper is to examine the reliability of URI citations in 10 years worth of AusWeb proceedings, particularly to determine the durability of such references, and to classify their causes of unavailability. Introduction The AusWeb conference has played a significant role in promoting and advancing research in web technologies in Australia over the last decade. In addition, the AusWeb forum serves as a point of reflection for practitioners engaged in web infrastructure, content and policy development; allowing the distillation of best practice in the management of web services particularly in higher educational institutions in the Australasian region. Papers contributed to AusWeb are highly connected to the web in general, to digital libraries and to other conference sites in particular, owing to the publication of proceedings in HTML and full support for hyperlink based referencing.
    [Show full text]
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • TRABAJO DE DIPLOMA Título: Diseño De La Página Web De Antenas
    FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TRABAJO DE DIPLOMA Título: Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos Tutor: Dr. Roberto Jiménez Hernández Santa Clara 2006 “Año de la Revolución Energética en Cuba” Universidad Central “Marta Abreu” de Las Villas FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TTRRAABBAAJJOO DDEE DDIIPPLLOOMMAA Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos e-mail: [email protected] Tutor: Dr. Roberto Jiménez Hernández Prof. Dpto. de Telecomunicaciones y electrónica Facultad de Ing. Eléctrica. UCLV. e-mail: [email protected] Santa Clara Curso 2005-2006 “Año de la Revolución Energética en Cuba” Hago constar que el presente trabajo de diploma fue realizado en la Universidad Central “Marta Abreu” de Las Villas como parte de la culminación de estudios de la especialidad de Ingeniería en Telecomunicaciones y Electrónica, autorizando a que el mismo sea utilizado por la Institución, para los fines que estime conveniente, tanto de forma parcial como total y que además no podrá ser presentado en eventos, ni publicados sin autorización de la Universidad. Firma del Autor Los abajo firmantes certificamos que el presente trabajo ha sido realizado según acuerdo de la dirección de nuestro centro y el mismo cumple con los requisitos que debe tener un trabajo de esta envergadura referido a la temática señalada. Firma del Tutor Firma del Jefe de Departamento donde se defiende el trabajo Firma del Responsable de Información Científico-Técnica PENSAMIENTO “El néctar de la victoria se bebe en la copa del sacrificio” DEDICATORIA Dedico este trabajo a mis padres, a mí hermana y a mi novia por ser las personas más hermosas que existen y a las cuales les debo todo.
    [Show full text]
  • SHOW TEASE: It's Time for Security Now!. Steve Gibson Is Here. We're Going to Talk About the Strange Case of the Estonian ID Cards
    Security Now! Transcript of Episode #642 Page 1 of 30 Transcript of Episode #642 BGP Description: This week we examine how Estonia handled the Infineon crypto bug; two additional consequences of the pressure to maliciously mine cryptocurrency; zero-day exploits in the popular vBulletin forum system; Mozilla in the doghouse over "Mr. Robot"; Win10's insecure password manager mistake; when legacy protocol come back to bite us; how to bulk-steal any Chrome user's entire stored password vault; and we finally know where and why the uber-potent Mirai botnet was created, and by whom. We also have a bit of errata and some fun miscellany. Then we're going to take a look at BGP, another creaky yet crucial - and vulnerable - protocol that glues the global Internet together. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-642.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-642-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We're going to talk about the strange case of the Estonian ID cards. A weird bug or actually flaw introduced into Microsoft's Windows 10. We're still not sure exactly who got it and why. We'll also talk about the case of the Firefox plugin promoting "Mr. Robot," and a whole lot more, all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 642, recorded Tuesday, December 19th, 2017: BGP. It's time for Security Now!, the show where we cover your security online with this guy right here, the Explainer in Chief, Steve Gibson.
    [Show full text]
  • Clearing of Cache & Cookies
    Clearing of Cache & Cookies What is cache? Cache memory is temporary memory used to store information that you accessed when visiting web sites. Cache speeds up a computer’s connection time with web sites that have been visited previously by locally storing information about that connection on the computer so that it does not have to be downloaded each time a site is visited. Why should cache be cleared periodically? Cache can become corrupt or outdated. As a result, cache can slow down or prevent a web page’s output and/or connection instead of assisting it. Clearing cache deletes corrupt or outdated data. It also removes unnecessary information stored in memory from sites that were only visited one time. Clearing Cache helps all web surfing not just PAWS. Internet Explorer 8 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Select Internet Options. 4. From the General Tab, click on Delete under Browsing History. 5. Uncheck Preserve Favorites website data and check both Temporary Internet Files and Cookies. 6. Click Delete. Internet Explorer 7 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Click on Internet Options. 4. Click on Delete under Browsing History. 5. Click Delete cookies. 6. When prompted, click Yes. 7. Click on Delete Internet Files. 8. When prompted, click Yes. 9. Click Close. 10. Click OK. 11. Close and reopen the browser for the changes to go into effect. Internet Explorer 6 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Click on Internet Options. 4.
    [Show full text]
  • Ideal Spaces OS-Platform-Browser Support
    z 4.9 OS-Platform-Browser Support v1.4 2020spaces.com 4.9 Table of Contents Overview....................................................................................................... 3 System Requirements ................................................................................... 4 Windows .................................................................................................................................................... 4 Mac ............................................................................................................................................................ 4 Support Criteria ............................................................................................ 5 OS Platform ................................................................................................................................................ 5 OS Version .................................................................................................................................................. 5 Web Browser and Operating System Combinations ..................................... 6 Current Platform / Web Browser Support ................................................................................................. 6 Out of Scope Browsers and Operating Systems ............................................ 7 Opera ..................................................................................................................................................... 7 Linux ......................................................................................................................................................
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • Netscape 6.2.3 Software for Solaris Operating Environment
    What’s New in Netscape 6.2 Netscape 6.2 builds on the successful release of Netscape 6.1 and allows you to do more online with power, efficiency and safety. New is this release are: Support for the latest operating systems ¨ BETTER INTEGRATION WITH WINDOWS XP q Netscape 6.2 is now only one click away within the Windows XP Start menu if you choose Netscape as your default browser and mail applications. Also, you can view the number of incoming email messages you have from your Windows XP login screen. ¨ FULL SUPPORT FOR MACINTOSH OS X Other enhancements Netscape 6.2 offers a more seamless experience between Netscape Mail and other applications on the Windows platform. For example, you can now easily send documents from within Microsoft Word, Excel or Power Point without leaving that application. Simply choose File, “Send To” to invoke the Netscape Mail client to send the document. What follows is a more comprehensive list of the enhancements delivered in Netscape 6.1 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape 6.1 Highlights PR Contact: Catherine Corre – (650) 937-4046 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape Communications Corporation ("Netscape") and its licensors retain all ownership rights to this document (the "Document"). Use of the Document is governed by applicable copyright law. Netscape may revise this Document from time to time without notice. THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL NETSCAPE BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY ERROR IN THIS DOCUMENT, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS, PROFITS, USE OR DATA.
    [Show full text]
  • Marcia Knous: My Name Is Marcia Knous
    Olivia Ryan: Can you just state your name? Marcia Knous: My name is Marcia Knous. OR: Just give us your general background. How did you come to work at Mozilla and what do you do for Mozilla now? MK: Basically, I started with Mozilla back in the Netscape days. I started working with Mozilla.org shortly after AOL acquired Netscape which I believe was in like the ’99- 2000 timeframe. I started working at Netscape and then in one capacity in HR shortly after I moved working with Mitchell as part of my shared responsibility, I worked for Mozilla.org and sustaining engineering to sustain the communicator legacy code so I supported them administratively. That’s basically what I did for Mozilla. I did a lot of I guess what you kind of call of blue activities where we have a process whereby people get access to our CVS repository so I was the gatekeeper for all the CVS forms and handle all the bugs that were related to CVS requests, that kind of thing. Right now at Mozilla, I do quality assurance and I run both our domestic online store as well as our international store where we sell all of our Mozilla gear. Tom Scheinfeldt: Are you working generally alone in small groups? In large groups? How do you relate to other people working on the project? MK: Well, it’s a rather interesting project. My capacity as a QA person, we basically relate with the community quite a bit because we have a very small internal QA organization.
    [Show full text]
  • Spybot - Search & Destroy Can Detect and Remove Spyware of Different Kinds from Your Computer
    Description Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not cover yet. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D; is free, so there's no harm in trying to see if something snooped into your computer, too :) Spybot-S&D; can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and offers some extended reporting features. License Spybot-S&D; comes under the Dedication Public License. Requirements Microsoft Windows 95, 98, ME, NT, 2000 or XP (32 and 64 bit), 2003, Vista. Compatible with bootable PE disks (e.g. BartPE) and Wine. Minimum of 10 MB free hard disk space, more recommended for updates and backups. Usage We recommend that you continue by reading the tutorial next. © 2000-2008 Safer Networking Ltd. All rights reserved. I. Freeware First of all, the reasons why Spybot-S&D; is free: I.a. Dedication Spybot-S&D; is dedicated to the most wonderful girl on earth :) I.b.
    [Show full text]
  • Silkperformer® 2010 R2 Release Notes Borland Software Corporation 4 Hutton Centre Dr., Suite 900 Santa Ana, CA 92707
    SilkPerformer® 2010 R2 Release Notes Borland Software Corporation 4 Hutton Centre Dr., Suite 900 Santa Ana, CA 92707 Copyright 2009-2010 Micro Focus (IP) Limited. All Rights Reserved. SilkPerformer contains derivative works of Borland Software Corporation, Copyright 1992-2010 Borland Software Corporation (a Micro Focus company). MICRO FOCUS and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus (IP) Limited or its subsidiaries or affiliated companies in the United States, United Kingdom and other countries. BORLAND, the Borland logo and SilkPerformer are trademarks or registered trademarks of Borland Software Corporation or its subsidiaries or affiliated companies in the United States, United Kingdom and other countries. All other marks are the property of their respective owners. ii Contents SilkPerformer Release Notes ..............................................................................4 What's New in SilkPerformer 2010 R2 ...............................................................5 Browser-Driven Load Testing Enhancements .......................................................................5 Enhanced Support for Large-Scale Load Testing .................................................................6 Support for Testing BlazeDS Server Applications .................................................................7 Support for Custom Terminal Emulation Screen Sizes .........................................................7 Graceful Disconnect for Citrix Sessions ................................................................................7
    [Show full text]