X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cybercrime


Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000

cybercrime  Cybercrime on the Internet Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information t

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » cybercrime

The 7 Habits of Highly Effective Security


You know your organization needs to be proactive about security, but you don't know what that means. You’re a busy executive and you need your security agenda summed up in a nutshell, but you know nothing about information security. What "to do" list should you give your CIO?

cybercrime   Read More

Study Shows: FBI Alienates Industry Security Experts


A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best industry security professionals want nothing to do with helping the FBI resolve cybercrime. Recently, one of the leading Department of Justice attorneys general, well-known for expertise in successfully prosecuting cybercrime, asked TechnologyEvaluation.Com why so many security and information technology professionals snub their noses at law enforcement agencies that exist to protect our nation's vital assets - private and public. TechnologyEvaluation.Com went behind the scenes to find o

cybercrime   Read More

With Record Revenues, AXENT Puts Down a Solid Fist


Cybercrime and information security attacks are not going to go away. AXENT's three protection products, Intruder Alert, Raptor Firewall, and NetProwler contain the most fundamental security protection products that any aspiring Internet company should include in their IT strategy - network based intrusion detection, host based intrusion detection, and an enterprise hybrid firewall.

cybercrime   Read More

How To Mitigate Holiday Cybercrime


Shop.org, and the Boston Consulting Group, reported that sales during the 1998 holiday season grew by 230 percent. With today's tools, just about anyone can throw up a professional looking website, and make claims about tight security. How can you protect yourself from fly-by-night internet sites, and malicious cyber sleuths who are ready and waiting to "sniff your password and credit card information while transaction is in process? There no way to mitigate every single riskhowever common sense can do wonders helping eliminate e-tail dangers. It pays homework before shopping online.

cybercrime   Read More

Seven Steps to Flawless Business Intelligence


Business intelligence (BI) capabilities transform vast amounts of data into relevant information that organizations rely on to make decisions and manage performance. Most companies have some form of BI, and most are familiar with its benefits. However, in order to extract maximum advantage from BI initiatives, it is necessary to be aware of—and avoid—their seven “fatal flaws.”

cybercrime   Read More

TEC Helps Utilities Company Select Best-fit Financials and Human Resources Systems


South Coast Water District (SCWD), an independent provider of high-quality water services based in Laguna Beach, California (US), was experiencing some of the common problems utilities companies face with inefficient IT systems. The company recently discovered that its paper-based processes—such as purchasing and procurement—were not only producing volumes of waste paper, but also creating extra work for its finance and human resources staff. SCWD decided to define its process requirements internally in order to select an appropriate financials system with integrated human resource (HR) functionality so it could operate more efficiently and eliminate the need for paper processes.

cybercrime   Read More

Five Must-have ERP Features for Medical Device Manufacturers


In the medical device manufacturing industry, errors can cost more than money—they can cost lives. In order to meet safety regulations, manufacturers are turning to enterprise resource planning (ERP) solutions. Discover the five features any medical device manufacturer should look for in an ERP system in order to meet compliance requirements, produce high-quality products, operate efficiently, and maximize profitability.

cybercrime   Read More

IP Telephony 101: The Utter Beginner’s Guide


Telephony. Sounds harmless enough. First, a definition from Merriam-Webster: “the use or operation of an apparatus (as a telephone) for transmission of sounds as electrical signals between widely removed points.” Gotcha. I’m with you. Me hear pretty, oll korrect. Now let me just dip into my pile of telephony white papers, which I’ve been using as a doorstop until now (through

cybercrime   Read More

TEC's Talent Management Research Model-What End Users Need to Know


Over the past few months, analysts at Technology Evaluation Centers (TEC) have been working on a new research space for talent management. I’m happy to announce that the Talent Management research space for talent management systems is now online and available to the public. Talent Management: What’s In It? TEC’s new Talent Management research space is geared toward end users looking for

cybercrime   Read More

RFID Workbench: Understanding the Basics


Radio frequency identification (RFID) helps actualize the perfect integration of logistical and commercial chains and its use is rising in the US and Europe among large companies; government departments; and industries. Setting up RFID requires a validation test on a defined perimeter that involves the processes that have the most direct impact on your activity to see how RFID will affect your environment.

cybercrime   Read More