Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
eBay Looking For Sun Block?
The now-infamous 1999 shutdowns of the eBay website has led them to consider alternatives to their current Sun infrastructure.
: eBay Looking For Sun Block? eBay Looking For Sun Block? R. Krause - May 26, 2000 Read Comments R. Krause - May 26, 2000 Event Summary In the wake of last year s highly publicized, extremely embarrassing outages at their online auction site, eBay has put out for bid a special contract for its infrastructure/back end. The present supplier, Sun Microsystems, is not a shoo-in for the contract, and is expected to face stiff competition in the form of Unix systems from Compaq, HP, and IBM. The main eBay servers
Block Unprecendented Assault on Your Customers Personal and Financial Data
Find out more in winning the pci compliance battle, a practical guide to pci compliance, including a comprehensive plan for the secure handling, pr...
: Block Unprecendented Assault on Your Customers Personal and Financial Data Block Unprecendented Assault on Your Customers Personal and Financial Data If some of the biggest names can get caught off guard, how can you prevent it from happening to you? Bank of America, Citigroup, Polo Ralph Lauren, Hotels.com, and CardSystems Solutions have all suffered negative publicity and financial losses due to a major data security breach. You can protect yourself—with the industry s easiest, most cost-effective
5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain
Beyond the operational efficiencies and cost savings of an improved product audit trail, standardized GS1 barcode labels contribute to greater supply chain security by protecting against the entry of counterfeit products into a legitimate supply chain. There are many complications to having fully conforming GS1 barcode labels, however. Find out how to address these issues with five strategies for the global supply chain.
: 5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain 5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain Source: Loftware Document Type: White Paper Description: Beyond the operational efficiencies and cost savings of an improved product audit trail, standardized GS1 barcode labels contribute to greater supply chain security by protecting against the entry of counterfeit
11/14/2008 12:34:00 PM
The ERP Market 2001 And Beyond – Aging Gracefully With The ‘New Kids On The Block’
Although we believe that exorbitant growth rates are a matter of the past, growth will remain the word associated with the ERP market in the 2000’s. ERP will, however, have to share the spotlight with the fast growing adolescent ERP-adjacent areas like SCM, CRM and e-procurement.
: ‘New Kids On The Block’ The ERP Market 2001 And Beyond – Aging Gracefully With The ‘New Kids On The Block’ P.J. Jakovljevic - October 3, 2001 Read Comments The ERP Market 2001 And Beyond - Aging Gracefully With The New Kids On The Block P.J. Jakovljevic - October 3, 2001 Executive Summary Enterprise resource planning (ERP) integrated software solutions have become synonymous with competitiveness, particularly throughout the 1990 s. ERP systems replace islands of information with a single,
The Whitelisting of America: Security for IT » The TEC Blog
to Selinux. Rather then block bad applications that it recognizes by signature, it allows execution of those applications and processes that match the security rules and internal certificates. Again, for example, a video driver is only allowed to be a video driver, and nothing else. In the same vein, a program may be allowed to write to a file, but not to use video, or be allowed to trap keystrokes. In effect, like Selinux, whitelisting builds good fences around all modules, and makes for a very secure
: Database Systems, eWeek, Flask, Jason Brooks, National Security Agency, NSA, Security, Selinux, Whitelisting, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Pricing Management Vendor Must Show Proven Payback from Clients
Vendavo’s recent growth is due to its reseller partnership with SAP, and the segmentation and optimization functionalities of its pricing solutions. But the vendor needs to stay on its toes, at least until its role in lifting almost every client profit margins is proven.
: close. At the starting block for identifying pricing opportunities is Vendavo Dynamic Segmentation , a module that enables fine-grained pricing. Initial customer segmentation is done via new, sophisticated data mining capabilities; then, users can refine segments on an ongoing basis using statistical analysis. Also, industry-specific statistical models are used to uncover pricing opportunities with a number of patent-pending algorithms for calculating pricing power and pricing risk scores. (For the
The 2008 Handbook of Application Delivery: A Guide to Decision Making
The 2008 Handbook of Application Delivery: a Guide to Decision Making. Documents and Other Computer Software to Use In Your Application Delivery System. IT organizations can no longer manage networks in isolation from the applications they support, requiring a shift from focusing on devices to a focus on performance. But a number of factors complicate the task of ensuring acceptable application performance, including the lack of visibility into application performance. Learn tips to plan, optimize, manage, and control your application performance and improve delivery.
: regard as a building block of management functionality. That means baselining is a component of several key processes, such as performing a pre-assessment of the network prior to deploying an application or performing proactive alarming. The Team Leader stated that his organization does not baseline the company s entire global network. They have, however, widely deployed two tools that assist with baselining. One of these tools establishes trends relative to their traffic. The other tool baselines the end
6/20/2008 12:34:00 PM
Need for Content Security
Need for Content Security. Papers and Other Software Complex System to Use In Your Complex System for Content Security. The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best way to appear busy. Employees can open multiple pages, a few of them related to legitimate work, while the others cater to their
: Control remote file modification Block Spammerâ€s e-mail ID and issue warnings and notifications If your organization is large, then you need to assign uniform global security policies that govern all machines in your network. Recommended features of good Content Security software are given below: Control access to Websites The software should allow you to selectively block and allow websites on your network. The following issues need to be addressed: Restricted words: Software should allow you to
9/6/2005 12:18:00 PM
Concur s Customers Can Network Now
Following the path of other E-procurement vendors, Concur announced a purchasing network for large companies. At the same time, Concur announced that its entire suite of products, including access to its purchasing network, will be available to small and mid-sized companies as an outsourced, Web-based product.
: have been a stumbling block to companies interested in its E-procurement solution. The evaluation can now focus on the basics of features, company strength, and price. However, as Concur salespeople must surely be reminding their prospects, Concur has a suite of products that are reasonably well integrated. All company interested in E-procurement should evaluate Concur as a potential solution. For those companies interested in bringing other functions in addition to purchasing to the desktop, the contest
A Focused Web-based Solution for Chemicals, Drugs, and Mill-based Industries
SSI shows deep understanding of the requirements for chemical, drug, and mill-based industries. Consequently, it has developed such must-have capabilities as potency controls, container movements, top-down and bottom-up traceability, and controls for customs and excise, shelf life, and location validation.
: underlying algorithms (for instance, block scheduling, constraint-based scheduling, traditional MRP, load and transportation mode planning, and intelligent semi-finished stock utilization). A series of particular capabilities have been developed for industries which are manufacturing dimensional products (such as reels, coils, webs, sheets, and the like), where schedules are based on attributes, and where products are managed that appear in a large number of combinations of physical sizes and specificatio
TEC s Special Offers - 2008
: 2009 2010 2011 2012 Block Unprecendented Assault on Your Customers Personal and Financial Data 12/29/2008 Find out more in winning the pci compliance battle, a practical guide to pci compliance, including a comprehensive plan for the secure handling, pr... Read Block Unprecendented Assault on Your Customers Personal and Financial Data How to Keep Your Best Customers and People in Tough Times 12/18/2008 In the on-demand webcast how to keep your best customers and people in tough times, you ll find out
White Paper Newsletters