Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
SGC SuperCert - Automatic 128-bit set-up Encryption & SSL Certificate
thawte's new SGC SuperCert now automatically steps up to 128-bit encryption for certain end users with the Windows 2000 operating system who, in the past, would not receive 128-bit encryption irrespective of the version of Internet Explorer used. The systems affected are those that shipped prior to about March 2001 and did not subsequently have Microsoft's High Encryption pack or Service Pack 2 installed. thawte's SGC SuperCert ensures that all these site visitors enjoy the protection of the strongest SSL encryption available. Find out how you can ensure that you are providing the best possible encryption for each and every visitor to your web site.
6/8/2005 1:40:00 PM
CheckPoint & Nokia Team Up to Unleash a Rockin Security Appliance
In a partnership with Checkpoint, Nokia takes its Internet Appliance and throws in Firewall-1. The Nokia IP330, IP440, and IP650, the first highly-available firewall and VPN appliance line, is poised to wow the market with its all encompassing feature set.
: CheckPoint & Nokia Team Up to Unleash a Rockin Security Appliance CheckPoint & Nokia Team Up to Unleash a Rockin Security Appliance L. Taylor - November 10, 1999 Read Comments Event Summary CheckPoint Software Technologies Ltd. (NASDAQ: CHKP ) and Nokia (NYSE: NOK ) on October 19th, announced an expanded partnership where they will promote the Nokia IP330, IP440 and IP650 firewall/VPN appliances. This suite of security appliances marks the first time a firewall or VPN product has debuted with built-in
Netscreen ISG 2000
: Juniper Networks provides integrated firewall/IPSec VPN security appliances that administrators use to protect networks with a layered security approach.
Information Security RFP Template
: Information Security RFP Template covers industry-standard functional criteria of Information Security that can help you easily gather and prioritize your business needs in a simple and categorized excel document. More than a RFP template, it is a working document that serves as a knowledge base reference throughout the life-span of your Information Security software project. Includes: Firewall System,Intrusion Detection System,Anti-Virus System,Virtual Private Network (VPN),Public Key Infrastructure (PKI),Enterprise Applications,Cryptographic Module
IPSec VPNs for Extranets: Not what you want to wake up next to
In general VPNs are ill suited to building multi-company extranets, for any situation that extends across organizational boundaries, or where there is unbalanced trust between end points. This article discusses the basic requirements for a true extranet solution.
: IPSec VPNs for Extranets: Not what you want to wake up next to IPSec VPNs for Extranets: Not what you want to wake up next to Roger Wood - February 27, 2002 Read Comments Business Drivers for Extranets The market for extranet connections is growing because corporations are motivated to: Extend their B2B connections to existing partners (Today, an average of only 37% of corporations are connected with their business partners, usually with basic data exchanges such as EDI VANs (1) ) Expand these
Streamlining Training Services with E-learning to Help More Australian Job Seekers Find Work
To help job seekers become job-ready sooner, increase flexibility for job seekers in rural areas, replace instructor-led training with e-learning, and streamline operations and keep upfront costs minimal, Jobfind Centres Australia, member of Job Services Australia, turned to SumTotal® Learning Management. The product delivered Web-based e-learning programs, achieving better outcomes for job seekers and other benefits.
: SumTotal Systems, SumTotal Learning, virtual classroom, live online seminar, learning software, learning solution, virtual classroom software, language learning software, e learning software reviews, distance learning software, free e learning software, online learning software, e learning software review, best math learning software, learning software for adults, virtual classroom tools, interactive learning software, best e learning software, vocabulary learning software, virtual classroom design, virtual classroom training, e learning software comparison, open source virtual classroom, .
5/31/2011 12:34:00 PM
Deploying Lean Principles to ERP Implementation Projects » The TEC Blog
areas such as: Machine Setup Time, labor costs, and materials handling. During Machine setup, time is lost due to the time the machine operator must setup or take down and change tooling. At other times the employee must spend valuable time looking for tools or preparing for many delays related to machine setups as a result of constant changes to the production schedule at the same work station. One of the core values of Lean Manufacturing is known as the “5S Method.” Sort - Eliminate all unnecessar
: ERP, Infrastucture, Lean Manufacturing, Manufacturing, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Check Point Leads Firewall Market
With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.
: Check Point Leads Firewall Market Check Point Leads Firewall Market L. Taylor - July 25, 2000 Read Comments L. Taylor - July 25, 2000 Vendor Genesis Israeli based Check Point Software Technologies, Ltd., headquartered on the outskirts of Tel Aviv, was founded in 1993. On June 28, 1996, Check Point launched its IPO on NASDAQ under ticker symbol CHKPF. On March 3, 1999, they changed their ticker symbol to CHKP. Check Point s founder, Chairman, President, and CEO, Gil Shwed developed his security skills
Using PKI to Protect Your Business Information
Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. Like ERP and CRM infrastructures, a Public Key infrastructure has become an enabler of business objectives. PKI provides a systematic approach to information security.
: Using PKI to Protect Your Business Information Using PKI to Protect Your Business Information Arash Nejadian - December 24, 2003 Read Comments Arash Nejadian - December 24, 2003 Executive Summary As organizations evolve, they require new business models to become more efficient or to simply survive in this electronic age. Interconnection between vendors, suppliers, customers and employees through ERP and CRM tools, has become a competitive edge. The value of intellectual property has skyrocketed and the
Lean Tools and Practices that Eliminate Manufacturing Waste
A number of lean manufacturing tools and practices have long been used to reduce manufacturing waste. These include the five S's, visual controls, standardized work, mistake proofing, total productive maintenance, cellular manufacturing, single-digit setup, pull systems, sequencing, activity-based costing, and leveled production.
: factory floor. This includes setup and adjustment losses, idling and minor stoppages, reduced operating speeds, defects, rework, and startup yield losses. Machine breakdown is a critical issue for the shop floor, as in a lean environment one machine going down can stop the entire production line or flow. Accordingly, TPM and other advanced enterprise asset management (EAM) options increase equipment reliability, and thus improve availability, reduce downtime, reduce product scrap (and wasted time
Attracting New Customers with Highly-interactive Instructor-led Virtual Classes
When American Management Association (AMA) needed to migrate instructor content into virtual format; incorporate video, diagnostic instruments, polls, and evaluations; and build a curriculum that would drive the customer’s experience, it turned to SumTotal Learning. AMA deployed SumTotal Learning to manage the virtual classroom experience for individuals and corporate customers, creating a live online experience. See how!
: SumTotal Systems, SumTotal Learning, American Management Association, AMA, virtual classroom, live online seminar, learning software, learning solution, virtual classroom software, language learning software, e learning software reviews, distance learning software, free e learning software, online learning software, e learning software review, best math learning software, learning software for adults, virtual classroom tools, interactive learning software, best e learning software, vocabulary learning software, virtual classroom design, virtual classroom training, e learning software .
5/25/2011 4:26:00 PM
White Paper Newsletters