Featured Documents related to
Managing SSL Security
Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As
number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity.
Software Test Tools RFI/RFP Template
Used in Design, Used While Coding, Used While Testing, Test Support Tools, General Functionality, Integration with Other Tools, Testable Platform, Ease of Use and Customizable UI, Archite...
Get this template
Picture Archiving Communication Systems (PACS) for the Health Care Industry
PACS (Picture Archiving Communication System) manages the storage and display of digitized diagnostic images such as x-rays, CT Scans, and ultrasounds for use by radiologists and other clinician...
Start evaluating software now
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Secure Transfers of Large Files Over the Internet Using YouSendIt
A growing problem with rich multimedia electronic presentations is their increasing file size. Data files, in general, are larger, making it challenging to send
YouSendIt Enterprise Server includes use of a standalone application server that contains the same scalable architecture of the free service, but with additional privacy and security options. The Enterprise Server offers multi-tiered end user security including SSL encryption for data transfers, S/MIME for notifications, and optional SGC 128-bit encryption for even stronger protection. Also available is a Straight Through Processing option which allows users to receive a file as it is being uploaded by
Development of an Internet Payment Processing System
This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very
basic step is to use 128 bit SSL encryption that protects the system from eavesdropping. In order to protect from fraud with stolen card numbers, we introduced E-PIN. Cards are blocked after a settable number of attempts to enter an invalid E-PIN. The next step was to build an elaborate system of security/access logs that log all interesting events on all active system ports. Events are ranked according to their importance, and may be filtered and shown in different colors on the administrator's console.
The AS/400 Takes You Securely Where You Want to Go
This article on the built-in security features of the AS/400 system originally appeared in the Midrange Computing’s Showcase Magazine, June 2000.
card is registered. To use SET, the retailer does not have to handle the credit card. Due to the administrative overhead associated with it, SET has not caught on as well in the United States and Canada as it has among eCommerce vendors in Europe, however, that is likely to change as security engineers educate eCommerce vendors about the inherent weakness in Secure Sockets Layer (SSL). SSL only encrypts transactions in transit. Once a transaction has reached an Internet merchant, a user is placing an
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions from established vendors, like
consumer peace-of-mind through the use of cutting edge technology to meet emerging threats.
HR Analytics: Gaining Insights for the Upturn
Today’s leading-edge companies are making extensive use of workforce data to drive human capital management (HCM) decisions the way most companies use financial
companies are making extensive use of workforce data to drive human capital management (HCM) decisions the way most companies use financial and marketing data to make strategic business decisions. Learn how these companies are making fact-based workforce planning decisions that will help them survive the current recession and position them to quickly ramp up workforce additions when the downturn ends.
Using Extended Validation SSL to Increase Online Sales and Transactions
Online consumers need greater assurance that Web sites are legitimate and that their confidential information will be protected from malicious activity
Extended Validation SSL to Increase Online Sales and Transactions Online consumers need greater assurance that Web sites are legitimate and that their confidential information will be protected from malicious activity. Download this VeriSign white paper to learn more about new approaches to online security that can lead to increased online transactions, reduced shopping cart abandonment, and an improved bottom line.
Securing Your Online Data Transfer with SSL: A Guide to Understanding SSL Certificates, How They Operate, and Their Application
Secure socket layer (SSL) secures data transmissions across the Internet, and is an integral part of most Web browsers and Web servers. To make an SSL
Your Online Data Transfer with SSL: A Guide to Understanding SSL Certificates, How They Operate, and Their Application Secure socket layer (SSL) secures data transmissions across the Internet, and is an integral part of most Web browsers and Web servers. To make an SSL connection, SSL protocol requires that a server have a digital certificate installed—which is typically signed by an independent and trusted third party to ensure its validity. Find out more about SSL and how to know if you need
Expand Accelerators Datasheet: How to Use WAN Optimization to Solve the Server Consolidation Challenge
Delivering access to applications over the wide area networks (WANs) is now an essential aspect of any IT strategy to reduce total cost of ownership and improve
Accelerators Datasheet: How to Use WAN Optimization to Solve the Server Consolidation Challenge Delivering access to applications over the wide area networks (WANs) is now an essential aspect of any IT strategy to reduce total cost of ownership and improve return on investment. For example, server-based computing and server consolidation strategies can remove servers out of the branch offices to consolidate and centralize them in the data center, usually based on a virtualization infrastructure. Find out
Flexibility, Ease of Use Top Priorities for Companies Seeking Financials Software
In order to better understand the current state of the accounting and financial software market and determine the major trends and issues organizations are
Ease of Use Top Priorities for Companies Seeking Financials Software In order to better understand the current state of the accounting and financial software market and determine the major trends and issues organizations are experiencing with regards to accounting and financial applications, TEC recently conducted a poll, asking end-user respondents to answer five questions about their current accounting and financial software systems and the criteria that is important for them to consider
Five Things You Must Know When Selecting an Internet Content Filter
Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure
content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution.
Use Financial Analytics Solutions for Bigger Profits
And you can learn about it in the executive brief financial analysis clears the profit haze.
Financial Analytics Solutions for Bigger Profits Does it ever seem like you're shooting in the dark when it comes to making business decisions? You may get that feeling if you have only limited visibility into your company's financial state. Or if you have to rely on spreadsheets that contain errors and inconsistencies. Or if you're getting too many versions of the truth when it comes to analyzing your company's performance. If factors like these are creating a haze that's obscuring the true state o
New Generation of BI Tools More Powerful and Easier to Use
To learn how a new generation of BI tools can give you the knowledge you need to make the right business decisions at the right time, check out the...
Powerful and Easier to Use If knowledge is truly power, how do you convert your data into knowledge ? With business intelligence (BI) . BI can take the data from your ERP system and organize it into ways that give you knowledge about your markets, your customers, your business, and the way it's being run. Meaningful, actionable knowledge that gives you the power to act. And adapt. And stay ahead of the competition. To learn how a new generation of BI tools can give you the knowledge you need to make the
Business Process Management: A Crash Course on What It Entails and Why to Use It
Business process management (BPM) has to integrate existing enterprise applications, Web services, and people in such a way that it can also quickly change
Entails and Why to Use It Integrated and Process-oriented Solutions Are Required for Competitiveness Integrated solutions that optimize only at a company- or department-level are no longer sufficient for success in today's highly competitive, integrated supply chain environment. Every department contains mountains of data, but without an integrated and process-oriented solution, all this valuable information is often lost to the company as a whole. What is needed is a real time solution that goes beyond i
IBM Cognos 8 Business Intelligence Software for use with SAP NetWeaver Business Warehouse Accelerator
As business data volumes expand, the biggest challenge for businesses is channeling reams of data into usable information that supports effective decision
Business Intelligence Software for use with SAP NetWeaver Business Warehouse Accelerator As business data volumes expand, the biggest challenge for businesses is channeling reams of data into usable information that supports effective decision-making. Organizations that invest in the SAP Netweaver Business Warehouse continuously seek new ways to leverage the power of all corporate data. Learn how some companies are deploying IBM Cognos business intelligence software in the SAP NetWeaver environment.
Meet TEC's Experts
Software Evaluation Reports
Features and Functions
Interactive Case Studies
News and Press Releases
TEC Case Studies
Working at TEC
White Paper Newsletters