Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Webtime Now Legal
A court ruled illegal a one-year restriction that would have prevented an employee from working for a competitor.
: Webtime Now Legal Webtime Now Legal D. Geller - November 2, 1999 Read Comments Webtime Now Legal D. Geller - November 2, 1999 Event Summary It is common for a company to require new hires to sign agreements that would prevent them from working for competitors after they leave the company. Mark Schlack signed a one-year contract with EarthWeb in October 1998, according to the New York Law Journal. The following September he resigned to take a position with a new website, Itworld.com, to be launched by
Managing Expenses in the Legal Sector
Expense management in the legal sector can be complex and burdened with problems. Expense errors in claims sent to clients can not only result in time being spent in sorting out resulting issues, but can also impact the trust between the client and firm. Legal firms must ensure expenses are dealt with accurately, effectively, and in a timely manner. Download this paper for Quocirca’s recommendations for a chosen system.
: Managing Expenses in the Legal Sector Managing Expenses in the Legal Sector Source: Quocirca Ltd Document Type: White Paper Description: Expense management in the legal sector can be complex and burdened with problems. Expense errors in claims sent to clients can not only result in time being spent in sorting out resulting issues, but can also impact the trust between the client and firm. Legal firms must ensure expenses are dealt with accurately, effectively, and in a timely manner. Download this paper
2/29/2012 10:55:00 AM
Legal Considerations in E-commerce
Doing business on the Internet can involve some tricky legal issues. This article will help you understand the kinds of information you need to provide to your attorney to get the best possible advice on setting up your new Internet business.
: Legal Considerations in E-commerce Legal Considerations in E-commerce D. Geller - November 1, 1999 Read Comments Legal Considerations in E-Commerce Anthony E. Perkins, Esq. and Dennis P. Geller, Ph.D. December 9th, 1999 Guest Analyst: Anthony E. Perkins is an Attorney and a Principal with TechVentures Group, LLC., a business advisory group focused on technology-oriented businesses and ventures seeking expert assistance and information on starting, growing, selling, merging or financing their companies.
Legal ASP Persists
In May 2000, TEC reviewed the web site for ASPORA, an ASP aimed at the Legal Community and found it wanting in substance. This is a revisit to that web site at the company’s invitation.
: Legal ASP Persists Legal ASP Persists C. Lisle - February 9, 2001 Read Comments C. Lisle - February 9, 2001 Event Summary In May 2000 a TEC Business Analyst, prompted by a press release, reviewed a new ASP solution aimed at helping law firms and corporate legal departments work more efficiently. The idea of an ASP (application service provider) serving law firms and corporate counsel nationwide looked really good. According to the press release, ASPORA, provides the U.S. legal market with integrated
Enterprise Content Management Solution Creates the Ultimate Customer Experience
Interwoven has grown from a web content management vendor to an enterprise content management (ECM) vendor providing a full suite of ECM components. With this suite, it helps its clients provide the ultimate customer experience.
: extremely strong in the legal and financial industries. The vendor categorizes its main focus as being in customer experience, professional services, and financial services solutions. Interwoven began as a web content management (WCM) vendor, providing a solution for document management, as well as the ability to publish this content to different web sites. Throughout the last five years, Interwoven has acquired companies in digital asset management (DAM), records management, and collaborative document
Bullet-proofing Instant Messaging
Bullet-proofing Instant Messaging.Solutions and Other Documents to Characterize Your Buy, In Relation To ullet-proofing Instant Messaging. As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk.
: risks and potentially devastating legal liabilities or financial losses. Because most consumer-grade IM technology is not encrypted, that makes a good place to start exploring how and why this claim holds water. Many IM packages also lack strong proofs of user identity, perform neither file nor content screening on transmissions and directly expose users to malicious software and behavior. No limits or blocks to malware exposure IM makes it extremely easy for malicious users to attach infected files or
9/3/2009 4:36:00 PM
Governance of Federated Business Models
During the last twenty years, businesses migrated from vertical integration to a virtual model, outsourcing all their non-core functions. This has created challenges in aligning the strategies and activities of all these functions dispersed across the supply chain, each in separate legal entities. The next phase of evolution to emerge is the
: chain, each in separate legal entities. The next phase of evolution to emerge is the dynamic federation , or federated supply chain which is governed differently than both vertical and virtual businesses. Figure 1 Migration from Vertical Integration to Virtual Enterprise ( click here for larger verison ) In the old vertically integrated business, the CEO crafted the vision and articulated the strategy in order to get the business units and internal functions in synch and pulling in the same direction.
G-Log Offers New Start For CEO, Management Team
Global Logistics Technologies (G-Log) will soon launch its Internet-based logistics software business for the transportation industry. G-Log is a new beginning for CEO Mitchell Weseley.
: entangle him in a legal morass just a few years ago. Prior to G-Log, Mitchell Weseley was best known as the founder of his namesake, Weseley Software Development Company (WSDC). Incorporated in 1992, WSDC became the subject of litigation following its acquisition by Pinnacle Automation, Inc. and subsidiaries, Alvey Systems and McHugh Software Corporation. Following the 1995 sale, WSDC was eventually absorbed by McHugh Software and Wesley found himself displaced as the division head. A man without a
Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)?
Determining when to classify a program as being either unwanted or unsafe can be particularly challenging, because a researcher has to look not just at what a program does, but what the intent is behind it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat.
: it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat. Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)? style= border-width:0px; /> comments powered by Disqus Related Topics: Security Related Industries: Industry Independent Related Keywords: potentially
12/19/2012 10:40:00 AM
E-discovery Compliance and The New Requirements of IT: The IT Manager’s Guide to 100% Compliance
Explore e-discovery compliance and the new requirements of IT: The IT Manager's Guide to 100% Compliance.Facts you should know about email archiving. Considering that e-mail and other electronically stored information (ESI) create the electronic equivalent of DNA evidence, there is no doubt that their evidentiary role will continue to expand. Learn how implementing a strategic e-discovery compliance program can help US and Canadian employers preserve, protect, and produce legally compliant e-mail and other ESI when compelled to do so by a court or regulatory body.
: compliance legal, legal compliance, ediscovery software, ediscovery email, ediscovery jobs, compliance with legal, ediscovery law, ediscovery compliance, ediscovery litigation, ediscovery rules, legal compliance officer, legal ediscovery, corporate legal compliance, ediscovery cost, ediscovery manager, women in ediscovery, ediscovery review Source: Symantec Learn more about Symantec Readers who downloaded this white paper also read these popular
1/18/2010 4:20:00 PM
Top 10 Web Threats and How to Eliminate Them
IT managers have to protect the business against malware, keep Internet bandwidth available for legitimate business needs, and enforce acceptable use policies for the human resource department. Managers must also find a balance between allowing reasonable personal Internet use at work and maintaining productivity and concentration in the office. Learn how to deal with the top 10 threats facing these managers.
: Symantec Hosted Services, work law, web use, employee human resources, retirement employee, bandwidth management, bandwidth monitoring, management bandwidth, employee contract, bandwidth software, employee law, bandwidth limiter, employees rights, bandwidth limiting, limiting bandwidth, employee employment, bandwidth router, employee laws, employee hr, bandwidth linux, howto use, employee manual, employee leasing, bandwidth control, hiring employees, employee workplace, network bandwidth monitor, legal employee, bandwidth tool, bandwidth network monitor, monitor employees, web policy, traffic .
8/13/2010 11:39:00 AM
White Paper Newsletters