Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
eBay Looking For Sun Block?
The now-infamous 1999 shutdowns of the eBay website has led them to consider alternatives to their current Sun infrastructure.
: eBay Looking For Sun Block? eBay Looking For Sun Block? R. Krause - May 26, 2000 Read Comments R. Krause - May 26, 2000 Event Summary In the wake of last year s highly publicized, extremely embarrassing outages at their online auction site, eBay has put out for bid a special contract for its infrastructure/back end. The present supplier, Sun Microsystems, is not a shoo-in for the contract, and is expected to face stiff competition in the form of Unix systems from Compaq, HP, and IBM. The main eBay servers
iCAST and Tribal Voice to AOL: “The Block Party is Getting Old”
AOL has always, and will continue to block disparate Instant Messaging systems from interacting with its 50 Million plus IM user base due to a potential negative financial impact.
: Voice to AOL: “The Block Party is Getting Old” iCAST and Tribal Voice to AOL: “The Block Party is Getting Old” P. Hayes - April 28, 2000 Read Comments P. Hayes - April 28th, 2000 Event Summary WOBURN, Mass. and DENVER (BUSINESS WIRE) - iCAST, an online entertainment company and Tribal Voice, a leading provider of co-branded instant messaging and interactive communication solutions, called on AOL to open up the company s instant messaging system. The announcement comes on the heels of AOL once
5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain
Beyond the operational efficiencies and cost savings of an improved product audit trail, standardized GS1 barcode labels contribute to greater supply chain security by protecting against the entry of counterfeit products into a legitimate supply chain. There are many complications to having fully conforming GS1 barcode labels, however. Find out how to address these issues with five strategies for the global supply chain.
: 5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain 5 Building Block Scenarios for Understanding the Challenge of GS1 Barcode Label Printing in Your Global Supply Chain Source: Loftware Document Type: White Paper Description: Beyond the operational efficiencies and cost savings of an improved product audit trail, standardized GS1 barcode labels contribute to greater supply chain security by protecting against the entry of counterfeit
11/14/2008 12:34:00 PM
How to Block NDR Spam
Research shows that up to 90 percent of e-mail received by companies is spam. In the beginning, spam was mainly text-based, but over the past few years, spammers are increasingly using embedded images and attaching common file types, such as mp3s, to gain access to mailboxes. Learn more about the types of spam out there, focusing on NDR, or non-delivery report spam—and how you can block it.
: How to Block NDR Spam How to Block NDR Spam Source: GFI Software Document Type: White Paper Description: Research shows that up to 90 percent of e-mail received by companies is spam. In the beginning, spam was mainly text-based, but over the past few years, spammers are increasingly using embedded images and attaching common file types, such as mp3s, to gain access to mailboxes. Learn more about the types of spam out there, focusing on NDR, or non-delivery report spam—and how you can block it. How to
6/27/2008 4:11:00 AM
The Tangled Web: Silent Threats and Invisible Enemies
Learn how protect your enterprise with Symantec Hosted Services Web Security.Read free Technology Evaluation Centers whitepapers. When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks.
: also allows you to block access to inappropriate websites by URL filtering, keeping your employees productive while enforcing acceptable usage policies. Source: Symantec Resources Related to The Tangled Web: Silent Threats and Invisible Enemies : Malware (Wikipedia) Internet Security (Wikipedia) The Tangled Web: Silent Threats and Invisible Enemies Web Security Software is also known as : Symantec Hosted Services Web Security , Symantec Hosted Services , Content Filtering Services , Malware ,
1/19/2010 2:12:00 PM
Laying the Tracks for the Technology Train
Don’t expect high marks in enabling business initiatives until your company gets its corporate strategy right. This note was based in part from an interview with Norm Smallwood, CEO of Results-Based Leadership.
: that the biggest stumbling block for the company as a whole was that it did not embrace shared services. We think the problems started earlier in the formation of the corporate strategy. Corporate strategy defines the number of businesses in the organization s portfolio and the relationship or synergy desired between them, as well as the future plan to maximize shareholder value. Corporate strategy is different from business strategy. Business strategy refers to how a business will win in its industry,
Vendor Articulates Message and Vision for Product Lifecycle Management
SAP has developed some crucial themes as it moves forward with their PLM vision and solution strategy. Product development lifecycles are shrinking, and managing the innovation process is becoming a broader requirement of manufacturers and retailers alike.
: its four dimensions in building-block fashion: Product and project portfolio management : idea management and concept development, project planning, time and resource management, project execution, and strategic portfolio management. It is also worth examining some key components of this dimension: SAP xApp Product Definition ( SAP xPD ), which addresses the front-end processes for definition and management of ideas, concepts, projects, and products. Collaboration Projects ( cProjects ), which supports
OKENA Brews Up a StormSystem that Secures All Applications
OKENA's announcement of their product line StormSystem indicates that they intend to grow and expand their innovative intrusion prevention system with highly integrated new add-ons. Having seen unprecedented success in obtaining funding and customers in one of the worst economies ever, Relevant Technologies expects OKENA to be a leading contender in an intrusion management market that has yet to boast a distinct leader.
: new players on the block, OKENA is hardly new to security. OKENA s expert knowledge of information security products, and the market, is a key, contributing factor to the early success they have seen so far. Vendor Recommendations and Future Visions The intrusion management market is a competitive market, and though there are no clear leaders, rival vendors are beginning to understand that detecting intrusions is not enough. Intrusion prevention is the next wave of intrusion management products, and
Ensuring E-mail Security: The Benefits of Using a Perimeter-based Managed Service
Ensuring E-mail Security: The Benefits of Using a Perimeter-based Managed Service. Get Free Information Related To The Benefits of Using a Perimeter-based Managed Service. There are hundreds of anti-spam and anti-virus products designed to defend against unwanted e-mail. These solutions can take the form of software, appliances, or managed services. Managed filtering services are convenient and economical, and are also extremely effective in managing threats. In fact, most managed e-mail defense services block threats before they even reach the internal network.
: managed e-mail defense services block threats before they even reach the internal network. Ensuring E-mail Security: The Benefits of Using a Perimeter-based Managed Service style= border-width:0px; /> comments powered by Disqus Related Topics: Security, Content Filtering, Network Security Monitoring, Spyware Detection and Removal, Virus Protection Related Industries: Professional, Scientific, and Technical Services Source: MX Logic Learn more about MX Logic Readers who
3/28/2007 11:34:00 AM
Standard & Poor s Exposes Customers Security
Due to security vulnerabilities in Standard & Poor's Comstock product, their customer sites throughout the world have been exposed to extensive security holes.
: Setup your firewall to block all outbound traffic. This will keep your Comstock box from being used as a launch pad for stolen software (warez) and other nefarious network activity. Put an intrusion detection system between your border routers and firewall in order to detect unsavory network activity before affects your network. Glossary warez: A term used by software pirates use to describe a cracked game or application that is made available to the Internet, usually via FTP or telnet, often the pirate
CDC’s Ross ERP Now TEC Certified » The TEC Blog
take it around the block with some scenarios. [ more on TEC Certification here ] I wasn’t disappointed during our recent certification of CDC Software’s Ross ERP. First, let me back up and give you a brief overview of the vendor and its product. CDC is a world-wide company, with 1,400 employees, primarily in North America and Europe. CDC acquired Ross ERP in 2004, gaining a well-established process manufacturing and supply chain management product that can reside on-premises or in the cloud. Ross has
: cdc software, certification report, ERP, ross erp, selection, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
White Paper Newsletters