Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Identix Leads Biometric Authentication
Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.
: Identix, Biometric Authentication, Identix DFR-300 Fingerprint Scanner, fingerprint scanning technology, fingerprint scanning technology vendors, fingerprint scanning technology leader, Identix's authentication systems, Identix products , Identix fingerprint scanner , fingerprint authentication technology , digital fingerprint scan , fingerprint data, fingerprint biometrics, BIOS level security, biometric security technology , Security Accounts Manager database, IT Data Security, biometrics security , information security content.
Using Keyboard, Video, and Mouse over IP to Connect Remote Networks
Using Keyboard, Video, and Mouse over IP to Connect Remote Networks. Get Knowledge Linked to Remote Networks. Today’s IT professionals are often challenged by unrelenting changes in the enterprise, increased data growth and compliance regulations, and geographic distribution of assets, to name a few. Keyboard/video/mouse (KVM) over Internet protocol (IP) can help by providing an effective tool that can remotely manage servers—regardless of their physical location. When looking for a KVM over IP solution, you should consider some basic requirements first.
10/24/2007 1:05:00 PM
NetGenesis Predicts The Future From Mouse Trails
NetGenesis recently released NetGenesis 5, a suite of web analytics applications that do more than report simple web statistics. NetGenesis claims that its new suite can provide actionable insight into the behavior of surfing customers.
: TeKey’s Software Development Kit (SDK) is designed for biometric system developers and integrators in order to evaluate SW capabilities. The program operates images containing any kind of biometric data (fingerprints, faces, hands etc.). The fingerprint recognition algorithm operates poor images with noises and artifacts, captured by inexpensive low quality sensors.
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.
: about computer security, advanced computer security, biometric computer security, business computer security, cert computer security, compare computer security, complete computer security, computer and network security, computer data security, computer hardware security, computer information systems security, computer internet security, computer network security, computer network security software, computer networking security, computer networks security, computer privacy security, computer security, computer security applications, computer security article, computer security articles, .
Presarios Freezing - and Not Because it s Winter
At least 20 Compaq customers who purchased the Presario 5800 PCs recently have reported inexplicable freezing of their PCs while surfing the Web or playing games.
: compaq notebooks, compaq 7470, my pc keeps freezing, compaq quickrestore, mouse freezes, computer repair, compaq quick restore, compaq computers, compaq laptops, compaq windows 98, how to restore compaq presario, fix computer, windows slow boot, computer repair help, compaq cmos, compaq recovery cd, windows xp crash, compaq bios update, computer startup problems, compaq recovery, computer troubleshooting, compaq restore, windows xp crashes, compaq, applying computer settings slow, computer freeze up, computer repair services, computer support, fix my slow computer, slow computers, stop .
AMD Athlon Debuts
SUNNYVALE, Calif.--(BUSINESS WIRE)--August 9th - AMD today introduced the 650MHz AMD Athlon(TM) processor, the world's fastest and highest-performance microprocessor for x86 computer systems.
: amd althon, amd althon 64, amd althon 64x2, amd althon xp, amd athlon, amd athlon xp, amd athlon xp 2200, amd athlon xp 3200, amd processor, amd xp, athlon amd, computer, computer hardware, computers, cpu microprocessor, desktop, desktop computer, intel, intell, mainboard, microcontroller microprocessor, microprocessor, microprocessor architecture, microprocessor chip, microprocessors, motherboard, processor, processors, hardware integration, hardware migration, hardware migration plan, hardware software, internal migration, migration, migration policy, migration routes, migration software, .
Identity-based NAC: Using Identity to Put the “Control” in Network Access Control
Identity-based NAC: Using Identity to Put the Control in Network Access Control. Learn About Network Access Control. Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.
2/5/2007 5:07:00 PM
Here Come the Information Appliances
The hot products at Comdex 99 are expected to be in the up-and-coming area of
: network security appliance, network protection, web server appliance, network security, print server appliance, no picnic, network security devices, network security device, monitoring network, network firewalls, network firewall, password management, password manager software, network monitoring tool, secure password manager, password keeper, why use a server, how to use a server, password manager, password manager xp, network management, network security design, network security solution, computer network security, network access control.
TeKey Research Group
: TeKey, a pattern recognition and biometric software designer, is based in Israel. TeKey is a research group of scientists, electronic engineers, and programmers developing principles in image processing, which are derived from an approach proposed in 1995 by the group's leader Dr. Kravtsov.
When Passwords Aren t Enough: The Need for Strong Online Authentication That Is Easy to Use
For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now.
: authentication, security, access management, website security, IT security, multifactor authentication, two factor authentication, web site security, two factor authentication solutions, open source two factor authentication, two factor authentication token, two factor authentication tokens, what is two factor authentication, two factor authentication vpn, two factor authentication smart card, two factor authentication options, two factor authentication definition, free two factor authentication, two factor authentication online banking, two factor authentication open source, two factor .
3/16/2011 8:54:00 PM
White Paper Newsletters