Recent Technology Changes in perimetersecuritysolutions.com

See full history

Technologies in use by perimetersecuritysolutions.com

Use CRM data to create personalized, highly targeted ad campaigns, and report on exactly which ads are turning prospects into customers.

Unified Advertising and Analytics solutions from Google

Hubspot provides marketing information and leads via inbounding marketing software.

Google Analytics is a service offered by Google that generates detailed statistics about a website's traffic and traffic sources and measures conversions and sales. Google Analytics can track visitors from all referrers, including search engines and social networks, direct visits and referring sites. It also displays advertisin...

Websites using some form of Captcha technology on them.

FancyBox is a tool for displaying images, html content and multi-media in a Mac-style "lightbox" that floats overtop of web page.

jQuery: The Write Less, Do More, JavaScript Library.

Modernizr is a JavaScript library that detects HTML5 and CSS3 features in the user’s browser and allows you to target specific browser functionality in your stylesheet.

Google Tag Manager makes it easy for marketers to add and update website tags including analytics, remarketing, and more.

A semantic personal publishing platform with a focus on aesthetics, web standards, and usability.

A jQuery slider toolkit.

CloudFlare is a global CDN and DNS provider that can speed up and protect any site online.

This site uses the viewport meta tag which means the content may be optimized for mobile content.

Websites using Google technologies

Websites using some type of cookie consent system

A rich hosted Exchange environment for every user without having to manage a server.

A family of standard web feed formats used to publish frequently updated information like blog entries, news headlines, audio and video.

Windows Live Writer Tagging Support Schema

Really Simple Discovery is a way to help client software find the services needed to read, edit, or "work with" weblogging software.

Content Security Policy is best used as defense-in-depth, to reduce the harm caused by content injection attacks.

Websites using https protocol.

The DOCTYPE is a required preamble for HTML5 websites.

Allows a website to define how a page is rendered in Internet Explorer 8, allowing a website to decide to use IE7 style rendering over IE8 rendering.

UTF-8 (8-bit UCS/Unicode Transformation Format) is a variable-length character encoding for Unicode. It is the preferred encoding for web pages.

A web page. Every web page is implicitly assumed to be declared to be of type WebPage, so the various properties about that webpage, such as breadcrumb may be used. We recommend explicit declaration if these properties are specified, but if they are found outside of an itemscope, they will be assumed to be about the page

A scheme.org entity that represents a blog.

The http-equiv attribute provides an HTTP header for the information/value of the content attribute. The http-equiv attribute can be used to simulate an HTTP response header.

When running in a browser on a mobile phone, "format-detection" meta tag determines whether or not telephone numbers in the HTML content will appear as hypertext links. The user can click a link with a telephone number to initiate a phone call to that phone number.

A canonical link element is an HTML element that helps webmasters prevent duplicate content issues by specifying the "canonical", or "preferred".

Wesites using favicon rel tag

This page contains a meta robots tag which tells search engines and robots to index or not index the page.

Typekit is the easiest way to use real fonts on the web. It's a subscription-based service for linking to high-quality Open Type fonts from some of the worlds best type foundries.