Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
eBay Looking For Sun Block?
The now-infamous 1999 shutdowns of the eBay website has led them to consider alternatives to their current Sun infrastructure.
: eBay Looking For Sun Block? eBay Looking For Sun Block? R. Krause - May 26, 2000 Read Comments R. Krause - May 26, 2000 Event Summary In the wake of last year s highly publicized, extremely embarrassing outages at their online auction site, eBay has put out for bid a special contract for its infrastructure/back end. The present supplier, Sun Microsystems, is not a shoo-in for the contract, and is expected to face stiff competition in the form of Unix systems from Compaq, HP, and IBM. The main eBay servers
iCAST and Tribal Voice to AOL: “The Block Party is Getting Old”
AOL has always, and will continue to block disparate Instant Messaging systems from interacting with its 50 Million plus IM user base due to a potential negative financial impact.
: Voice to AOL: “The Block Party is Getting Old” iCAST and Tribal Voice to AOL: “The Block Party is Getting Old” P. Hayes - April 28, 2000 Read Comments P. Hayes - April 28th, 2000 Event Summary WOBURN, Mass. and DENVER (BUSINESS WIRE) - iCAST, an online entertainment company and Tribal Voice, a leading provider of co-branded instant messaging and interactive communication solutions, called on AOL to open up the company s instant messaging system. The announcement comes on the heels of AOL once
The ERP Market 2001 And Beyond – Aging Gracefully With The ‘New Kids On The Block’
Although we believe that exorbitant growth rates are a matter of the past, growth will remain the word associated with the ERP market in the 2000’s. ERP will, however, have to share the spotlight with the fast growing adolescent ERP-adjacent areas like SCM, CRM and e-procurement.
: ‘New Kids On The Block’ The ERP Market 2001 And Beyond – Aging Gracefully With The ‘New Kids On The Block’ P.J. Jakovljevic - October 3, 2001 Read Comments The ERP Market 2001 And Beyond - Aging Gracefully With The New Kids On The Block P.J. Jakovljevic - October 3, 2001 Executive Summary Enterprise resource planning (ERP) integrated software solutions have become synonymous with competitiveness, particularly throughout the 1990 s. ERP systems replace islands of information with a single,
How to Block NDR Spam
Research shows that up to 90 percent of e-mail received by companies is spam. In the beginning, spam was mainly text-based, but over the past few years, spammers are increasingly using embedded images and attaching common file types, such as mp3s, to gain access to mailboxes. Learn more about the types of spam out there, focusing on NDR, or non-delivery report spam—and how you can block it.
: How to Block NDR Spam How to Block NDR Spam Source: GFI Software Document Type: White Paper Description: Research shows that up to 90 percent of e-mail received by companies is spam. In the beginning, spam was mainly text-based, but over the past few years, spammers are increasingly using embedded images and attaching common file types, such as mp3s, to gain access to mailboxes. Learn more about the types of spam out there, focusing on NDR, or non-delivery report spam—and how you can block it. How to
6/27/2008 4:11:00 AM
The Need for Vulnerability Management
The Need for Vulnerability Management. Download IT Study Guides for Vulnerability Management. New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards.
: The Need for Vulnerability Management The Need for Vulnerability Management Source: Qualys Document Type: White Paper Description: New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits
11/5/2008 11:31:00 AM
Microsoft Dynamics AX 4.0 for Manufacturing Environments
This continues a reprint of the summary chapter from the book Managing Your Supply Chain Using Microsoft Dynamics AX by Dr. Scott Hamilton. In this second part, design factors related to system usage in manufacturing enterprises are covered.
: for scheduling purposes. For block scheduling purposes, a work center s calendar can indicate blocks of working time with a related property, so that similar operations are scheduled together to minimize setup times. Order-Dependent Bill and Routing . A production order has a separate order-dependent bill and routing that initially reflect the assigned master bill and routing, and the user can manually maintain this information. Box: Scheduling Logic based on Routing Information A production order can be
Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
Be sure to protect your Web site by understanding techniques that can be used to detect when and how attackers compromise Web servers. Also, understand the business models behind malware attacks to better anticipate, and prevent, attacks on your business by reading this white paper.
: Malware Security Report: Protecting Your Business, Customers, and the Bottom Line Malware Security Report: Protecting Your Business, Customers, and the Bottom Line Source: Symantec Document Type: White Paper Description: Be sure to protect your Web site by understanding techniques that can be used to detect when and how attackers compromise Web servers. Also, understand the business models behind malware attacks to better anticipate, and prevent, attacks on your business by reading this white paper.
8/9/2010 5:03:00 PM
Five Things You Must Know When Selecting an Internet Content Filter
Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution.
: internet blocking, block internet, block malware Source: KDI Learn more about KDI Readers who downloaded this white paper also read these popular documents! ERP Implementation Best Practices: Manufacturers and the SaaS Delivery Model Three Keys to Better Data-driven Decisions: What You Should Know... Right Now Economic Benefits of PLM-enabled Collaboration ERP as a Living System: The Power of Community-Driven Product Enhancement TEC 2013 CRM Buyer s Guide for Medium and Large Enterprises
11/11/2009 11:21:00 PM
Design Anywhere: Maximizing the Global Opportunity, Minimizing the IP Risk
Design globalization—and the access it provides to new markets, talents, and resources around the world—offers many opportunities to manufacturers today. Tapping into this growing network of suppliers and partners does bring risks and challenges. You can achieve best-in-class performance in a global design environment and achieve greater profitability. Find out the product design strategies of best-in-class manufacturers.
: PTC, product development, product management, remove drm, drm removal, product launch, free drm, digital rights management, drm media, video drm, product lifecycle management, drm protection, how to drm, windows media drm, global design, drm protected, drm software, product development and design, new product launch, plm software, drm license, free drm removal, product launches, drm removal software, product launching, remove drm protection, product launch formula, remove drm free, drm free download, launch a product, launching new product, drm identifier download, free drm remover, freeware .
11/13/2009 10:58:00 AM
Executive Guide to Internal Data Theft: Why You’re at Risk
With your Internet and e-mail gateways largely secured against external hackers, most security breaches are now occurring within your network. But why should this issue be placed above the many other IT and governance concerns vying for your attention? Well, where would you be if your closest competitors suddenly had your latest technical blueprints—or if your customers all cancelled their accounts thanks to a data leak?
10/11/2007 11:39:00 AM
Taking Multilingual Support to the Next Level
Product managers in product companies are trying to develop applications that support multilingual functionality. Multinational corporations use multilingual software applications in order to increase their productivity and in some cases meet compliance regulations.
: which was meant to block cross-border fund transfers suspected of having links to terrorism, money laundering, and other nefarious activities. Since SEPA intrinsically involves cross-border fund transfers, all transactions had to be screened by the sanctions screening application, which would approve a transaction or block it depending upon the outcome of verifications being implemented against various hot lists. Having been built with a fairly sophisticated level of multilingual support this application
White Paper Newsletters