X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 notebook or netbook


IBM to Demo Crusoe-based Notebook
At the upcoming PC Expo, IBM is planning to provide a technology demonstration - a ThinkPad notebook computer designed around Transmeta’s Crusoe microprocessor.

notebook or netbook  announcement of a Crusoe-based notebook and the actual shipment and problem-free usage of production-grade machines, many people will anxiously await this product from IBM. As with all new products, and especially those utilizing new technologies, we advise some caution before placing a Purchase Order for a large quantity - even if IBM's PC Expo demo is the greatest thing since sliced bread. Although we know of nothing fundamentally wrong with the Crusoe, usually the risks associated with new

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » notebook or netbook

“It’s a Notebook!” “It’s a Paperweight!” “Wait - It’s Both!”


Some Toshiba notebook buyers got a nasty surprise when they found their Intel CPU had died. Will Toshiba switch from “Intel Inside” to “AMD Instead”?

notebook or netbook  one of the leading notebook manufacturers for years. This embarrassment will not kill the product line, especially since the fault seems to lie with Intel. Although the foul-up will likely not cause Toshiba to reevaluate its relationship with Intel (euphemism for considering whether to dump Intel), we expect Toshiba (and any other vendors affected) will pay closer attention to products and components they receive from Intel. For Intel, this is the Nth in a string (growing longer all the time) of Read More

Cooler-running Notebooks from HP, Toshiba, et al.


Recent announcements from AMD, Toshiba, and Phoenix highlight an increasing focus on extending the battery life of notebook computers.

notebook or netbook  power its Pavilion N3215 notebook PC, and Toshiba has chosen these processors for its Tecra and Portege The first mobile devices to be manufactured on AMD's advanced 0.18 micron technology, these processors support a number of notable features including high-speed on-chip L2 cache, AMD's innovative PowerNow! battery saving technology and an enhanced implementation of AMD's 3DNow! instruction set with digital signal processing (DSP) instructions. April 17, 2000 [Source: Toshiba press release] - Read More

Dell Tops in Customer Satisfaction


Compaq rises, IBM falls, but Dell remains master of the desktop domain.

notebook or netbook  second position in the notebook segment, in both cases displacing IBM to No. 5 in desktops and No. 3 in notebook satisfaction. Market Impact No news is good news for Dell [NASDAQ:DELL]. Dell retains its position at the top of the TBR rankings. Sometimes, you try and you try, but you do get satisfaction. Compaq [NYSE:CPQ], with its recent efforts toward improving customer service and satisfaction, has pulled away from the rest of the pack and stands alone with rival Dell. Dell & Compaq are also virtually Read More

Beyond Spam – Email Security in the Age of Blended Threats


Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them.

notebook or netbook  Spam – Email Security in the Age of Blended Threats Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence Read More

The Hidden Role of Data Quality in E-Commerce Success


Successful e-commerce relies on intelligible, trustworthy content. To achieve this, companies need a complete solution at their back- and front-ends, so they can harness and leverage their data and maximize the return on their e-commerce investment.

notebook or netbook  item (like laptop versus notebook), leading to delays and dissatisfaction, at least, and causing searches to fail and prospects to click away, at worst. Previously, company representatives limited the exposure of internal data to outsiders and bridged the communications gap. But four trends arising from the nature of e-business expose and aggravate data quality issues, threatening revenue growth, online collaboration and relationships. It's important for businesses to understand these challenges and the r Read More

Are Your Laptops Protected against Careless Employee Use?


The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets off the local area network (LAN), remotely deleting sensitive data, and physically recovering stolen computers.

notebook or netbook  Affairs announced that a notebook computer containing the names, birthdates, Social Security numbers and limited health information of 26.5 million veterans and active-duty military personnel had been stolen. It took Veteran s Affairs officials more than two weeks to publicly disclose the breach. The laptop, stolen from the data analyst working for VA, became part of the largest data breach in U.S. history. The theft prompted a series of hearings in the U.S. Congress that criticized the VA s data security Read More

The Greening of SaaS


Traditionally, the advantage of software as a service (SaaS) is that it reduces the costs involved in installing, deploying, and supporting stand-alone software. But recent “green” initiatives have shed light on another benefit: with no hardware to purchase or software to run, SaaS applications require less energy than their on-premise counterparts. Learn how your company can benefit from the “greening” of SaaS.

notebook or netbook  on the desktop and notebook PCs, or other client devices that users may employ to access SaaS offerings. Because SaaS software and services only require the end user to have a current Web browser (some SaaS tools even work with stripped-down browser versions built for PDAs and smartphones), this extends the types of platforms that users can put to work. Outside the platform on which the browser runs, however, the rest of the hardware involved in SaaS services and software delivery is the service provider' Read More

How Do You Categorize Notebooks?


The notebook computer market has become one of the remaining battlegrounds for computer manufacturers. Our purpose here is to define the notebook market segments, describe what the general characteristics of each segment are, and to give users an idea of what features they can expect for each segment.

notebook or netbook  eye-catching, we think the notebook market is more properly segmented into groups characterized either by their primary function, or by their general class of machine. We believe this market can be broken down into four segments: Desktop replacement Highly mobile user General-purpose machines Very low-end machines There is, of course, overlap between some of the segments, but there are also key differences. For a more detailed look at how we distinguish these segments, skip ahead to the Segment Read More

Do You Want Your App to Talk Back to You (as a Chatterbox)? - Part 2


In Part 1 of this blog series I admitted to being a late adopter of a sort, in part for not immediately jumping onto the social media bandwagon. In particular, my initial reaction to Salesforce Chatter (a.k.a. Collaboration Cloud) was tepid. To be frank, Marc Benioff, salesforce.com’s flamboyant and engaging CEO, gave an atypically incoherent and dry keynote speech when he

notebook or netbook  on a par with  notebook PC s (and both surpassed  desktop computers  in 2008) when it comes to how we access the Internet. Fundamental Shift in Computing: Cloud 1 vs. Cloud 2 Salesforce.com is the first solely cloud-based company to exceed US$1.4 billion in revenues with over 77,300 corporate customers of all sizes. Possibly the best example of the pace of change in technology would be that even the Amazon.com, Google , and eBay metaphors of the early 2000s look a bit dated today in comparison to th Read More

What’s All This Benchmark Stuff, Anyway?


Vendors love to quote benchmarks in their product literature, press releases, and any place they think someone will use the numbers to make a buying decision. But what do the benchmarks mean, and which ones really matter?

notebook or netbook  performance WorldBench score BatteryMark Notebook Battery life when running Windows applications Life: minutes Web Polygraph Server (appliances) Measures performance and value of caching server appliances. Thruput: rps MRT: sec Price/perf: rp s/K$ WebStone Client/Server Measures throughput and latency of HTTP transfers Thruput: Mb/s Peak: Conns/sec VolanoMark Server Measures Java Virtual Machine (JVM) performance Unitless score DirectoryMark Server Measures LDAP directory server performance Ops/sec; resp. Read More

Intel Faces 820 Chipset Problems (Again)


In the latest round of setbacks to beset Intel’s performance-oriented 820 chipset, the manufacturer announces a recall of nearly a million motherboards shipped in 1999 & 2000.

notebook or netbook  Faces 820 Chipset Problems (Again) Intel Faces 820 Chipset Problems (Again) C. McNulty - June 1, 2000 Event Summary SANTA CLARA, Calif. - May 10, 2000 - Intel Corporation [NASDAQ:INTC] announced that it would replace motherboards that have a defective memory translator hub (MTH) component that translates signals from SDRAM memory to the Intel 820 chipset. The MTH is only used with motherboards utilizing SDRAM and the Intel 820 chipset. The MTH began shipping in November 1999; therefore systems Read More

Economic Benefits of PLM-enabled Collaboration


Many of today’s product lifecycle management (PLM)-enabling technologies allow complex information to be shared by dispersed teams of people. Product data management (PDM) technology is used to organize and provide access to your intellectual assets. PLM, its collaborative Product Definition management (cPDm) capabilities, and other solutions can help you go beyond asynchronous data sharing. Find out how.

notebook or netbook  each entry in the notebook is recorded with time, author, and other attributes. Project Team Rooms-These rooms are usually web-based collaborative workspaces that enable distributed teams to work together in a virtual team room. Project teams throughout the extended enterprise can work on tasks and goals, optimize collaborative business processes, improve innovation, streamline decision-making, etc. Data Visualization-These capabilities encompass a number of technologies including viewing and markup, si Read More

Smart Enterprise Single Sign-on (ESSO)


The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky note. This means the application of a single sign-on (SSO) solution provides greater security and improved user-friendliness and productivity. Learn how to increase the security and usability of existing and alternative authentication methods, and how the requirements for user authentication can be realized efficiently and at low cost.

notebook or netbook  is, for example, the notebook of the CEO or the Firewall of an enterprise, the effort of such an attack pays off quickly in most cases. Unfortunately, enterprises underestimate the danger and this is readily apparent when you can read the many embarrassing reports in the press Secure SignOn supports the extension of single-factor password authentication ( What You KNOW ) with a second factor ( What You HAVE ) or even a third factor ( What you ARE ) to accomplish Two Factor or even Three Factor methods Read More