X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet use

Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » internet use

Employee Web Use and Misuse: Companies, Their Employees, and the Internet


The Internet creates new opportunities for mischief—and new challenges for managers. How do you balance individual access with the overall good of the business? What’s the right balance between monitoring and blocking? Learn about a Web security solution that can allow you to monitor and enforce your Internet usage policies, bringing site monitoring and filtering together with anti-virus and anti-spyware protection.

internet use  Web Use , Employee Internet Use , Employee Web Security Service , Data Security Employee , Employee Surveillance Monitoring Internet Security , Security Threats Services Internet Usage , Assess Employee Internet Use , Internet Security Problem . Internet Use and Misuse Where do you draw the line? Is it okay to send the occasional personal email at work? What about a little internet shopping or spending sometime on social networking sites, playing online games, downloading pirated movies and music, Read More

Turn the Internet into a Strategic Sales and Interaction Channel


With the emergence of the Internet, the business environment has changed for many organizations, and will change to an even greater extent in the future. Indeed, in an increasingly dynamic and global environment, the Web has become an important source of competitive differentiation for companies of all sizes. In this comprehensive white paper, you’ll find out how to design a Web channel strategy that works for you.

internet use  Full Potential of the Internet Use Interactive Marketing to Increase Demand and Customer Loyalty Develop an Integrated Approach Across Marketing Channels Target Approaches Driven by Customer Intelligence Cultivate Two-Way Customer Relationships Turn the Internet into a Profitable Sales Channel Deliver Excellent Online Customer Experiences Integrate All Customer-Facing Channels Ensure Operational Excellence Throughout the Buying Process Consider New, Innovative Selling Models Boost Customer Satisfaction Read More

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

internet use  Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from Read More

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

internet use  the portal of the Internet payment processing company. This information includes previous payments made to the merchant, and history of accesses to their account information (for security purposes). Merchants can also change password for access to the account information. The system administrator of the processing company manages the system using the portal and back-office applications. The administrator may configure in the system database numerous merchant''s operational parameters such as type of Read More

Information/Internet Appliances


Information appliances, also called Internet or PC appliances, are a new market that appeal to those customers who want to reduce their desktop hardware expenditures. What are they, who makes them, and what do you get for your money?

internet use  this product as an Internet Device, but this appears to be just a stripped-down PC. For example, the base model ($499) has a 4.3GB hard drive, the system can take up to 256 MB of SDRAM, and it runs on an Intel Celeron with an Intel 810e chipset. Compaq''s use of the term legacy-free is limited to: no PCI/ISA slots, and USB for the keyboard/mouse. Although it is small and low cost, those two factors alone are insufficient to make this an appliance. Dell: Dell has recently started shipping its WebPC , Read More

Brooks Internet Software, Inc.


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

internet use  Internet Software, Inc. There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again. Read More

3 Key VoIP Phone System Features and How to Use Them Effectively


Telephony is changing as internet protocol (IP)-based phone systems take hold. An IP phone system can deliver calls over the network as clearly and reliably as the public switched telephone network (PSTN), and more and more companies are even choosing a hosted or cloud-based voice over IP (VOIP) solution over an installed system. Discover three key VoIP features that can help you take advantage of IP telephony.

internet use  Telephony is changing as internet protocol (IP)-based phone systems take hold. An IP phone system can deliver calls over the network as clearly and reliably as the public switched telephone network (PSTN), and more and more companies are even choosing a hosted or cloud-based voice over IP (VOIP) solution over an installed system. Discover three key VoIP features that can help you take advantage of IP telephony. Read More

How to Use Data Management Successfully


Find out in the white paper master data management: extracting value from your most important intangible asset.

internet use  to Use Data Management Successfully Did you know that effective master data management (MDM) is a critical component in an efficient, successful business? With the amount of data in a typical organization escalating dramatically, data management has become your most important intangible asset . If you aren''t managing your master data effectively, you could be opening the door to a host of problems: Part of your company is doing business with a client or account, but other parts of the company aren''t Read More

Novell Releases (Yet Another) Internet Messaging System


The only plausible reason to utilize a Novell Internet Messaging system is if you have NDS running internally, and even then it’s a big if, as Novell continues to lose market share in all major areas.

internet use  Releases (Yet Another) Internet Messaging System Novell Releases (Yet Another) Internet Messaging System P. Hayes - June 14 , 2000 Event Summary ORLANDO, Fla. (ISPCON Spring 2000), May 24 /PRNewswire/ -- Novell, Inc., a leading provider of Net services software, announced availability of the Novell Internet Messaging System2.5. An extremely scalable, cost-effective messaging service, Novell Internet Messaging System 2.5 makes it possible for service providers to offer fast, reliable hosted e-mail Read More

Use CMMS to Improve PdM Performance


Companies that have moved from a highly reactive environment to a more planned one notice significant improvement. A computer maintenance management system (CMMS) or an enterprise asset management (EAM) is a useful tool to create a planned environment, help build accurate equipment history, and develop comprehensive analysis capability. Reprinted with permission from Plant Engineering and Maintenance magazine.

internet use  purchase requisition via the Internet). The most comprehensive CMMS packages have linked condition monitoring to workflow software to define business rules and corresponding actions triggered. For example, a work crew has missed performing a PM routine many days in a row. As a result, the next scheduled PM is already due. Workflow software and business rules can be used to automatically prevent any further logging of time and materials against work orders until the PM routine is completed. Additionally, Read More

Europe's Mobile 'ONE' Selects InfoSpace for New Wireless Internet Services


Once a user has logged onto his/her home page he/she will be able to gain instant access to Calendaring, Address Books, Instant Messaging and access to user specific account information

internet use  InfoSpace for New Wireless Internet Services Europe''s Mobile ''ONE'' Selects InfoSpace for New Wireless Internet Services P. Hayes - May 2nd, 2000 Event Summary In April InfoSpace (Nasdaq: INSP - news), a leading global provider of information and commerce infrastructure services for wireless devices, merchants and Web sites, and ONE, Austria''s only full-service telecoms provider (mobile, fixed, and internet), announced that ONE has chosen InfoSpace''s comprehensive platform of commerce, information and Read More

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy to Use


For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site security now.

internet use  Passwords Aren''t Enough: The Need for Strong Online Authentication That Is Easy to Use For public-facing Web sites or those with a large consumer audience, finding a way to implement strong security that is easy to use is a great challenge. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication. Increase your Web site Read More

3 Key ERP Features and How to Use Them Effectively


Depending on the size and type of your business, your enterprise resource planning (ERP) solution may touch every department from accounting to warehouse management (WM). That can make it difficult to select the right solution for your company. But there are three critical modules an ERP system must have in order to deliver basic ERP benefits to any company, regardless of size or industry. Find out what they are.

internet use  Key ERP Features and How to Use Them Effectively Depending on the size and type of your business, your enterprise resource planning (ERP) solution may touch every department from accounting to warehouse management (WM). That can make it difficult to select the right solution for your company. But there are three critical modules an ERP system must have in order to deliver basic ERP benefits to any company, regardless of size or industry. Find out what they are. Read More

Monitoring How Your Assets Use Energy


To stay competitive in a rapidly changing market, organizations need to incorporate asset management capabilities that optimize not only their assets’ availability, performance, and quality, but also their energy consumption. Read this white paper to discover how adding an energy consumption component to your company's asset management systems can lead to big reductions in energy usage, a quick return on investment, and improved environmental conditions, as well as increased shareholder value and new market opportunities.

internet use  How Your Assets Use Energy To stay competitive in a rapidly changing market, organizations need to incorporate asset management capabilities that optimize not only their assets’ availability, performance, and quality, but also their energy consumption. Read this white paper to discover how adding an energy consumption component to your company''s asset management systems can lead to big reductions in energy usage, a quick return on investment, and improved environmental conditions, as well as Read More