X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 use ssl


Managing SSL Security
Secure sockets layer (SSL), an essential security protocol, has allowed the Internet to extend to e-business. At the heart SSL is the certificate. As

use ssl  number of certificates in use can grow into the hundreds or thousands, increasing your costs. Learn about the three key areas impacting the management of SSL certificates today—and what you can do to reduce cost and complexity.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Picture Archiving Communication Systems (PACS) for the Health Care Industry

PACS (Picture Archiving Communication System) manages the storage and display of digitized diagnostic images such as x-rays, CT Scans, and ultrasounds for use by radiologists and other clinicians.  

Evaluate Now

Documents related to » use ssl

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

use ssl  basic step is to use 128 bit SSL encryption that protects the system from eavesdropping. In order to protect from fraud with stolen card numbers, we introduced E-PIN. Cards are blocked after a settable number of attempts to enter an invalid E-PIN. The next step was to build an elaborate system of security/access logs that log all interesting events on all active system ports. Events are ranked according to their importance, and may be filtered and shown in different colors on the administrator's console. Read More

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust


Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions from established vendors, like VeriSign, that deliver protection and consumer peace-of-mind through the use of cutting edge technology to meet emerging threats.

use ssl  consumer peace-of-mind through the use of cutting edge technology to meet emerging threats. Read More

Protecting Users from Firesheep and Other Sidejacking Attacks with SSL


The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.

use ssl  best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks. Read More

The AS/400 Takes You Securely Where You Want to Go


This article on the built-in security features of the AS/400 system originally appeared in the Midrange Computing’s Showcase Magazine, June 2000.

use ssl  card is registered. To use SET, the retailer does not have to handle the credit card. Due to the administrative overhead associated with it, SET has not caught on as well in the United States and Canada as it has among eCommerce vendors in Europe, however, that is likely to change as security engineers educate eCommerce vendors about the inherent weakness in Secure Sockets Layer (SSL). SSL only encrypts transactions in transit. Once a transaction has reached an Internet merchant, a user is placing an Read More

Nine Ways to Use ERP to Make the Manufacturing Supply Chain Lean


There are entire books and thorough training and certification processes devoted to lean supply chain practices. But within any manufacturing environment, there are a few relatively simple steps that will help any enterprise make its supply chain lean. In this article, we will touch on these simple measures—measures that any company can take.

use ssl  Ways to Use ERP to Make the Manufacturing Supply Chain Lean Originally published - March 9, 2009 Lean in a supply chain context is about a holistic view of procurement, manufacturing distribution, and sales order processing. This means that some level of enterprise technology is necessary to view the organization in an integrated context instead of as functional islands. However, before technology can facilitate the lean supply chain, manufacturing executives need to start thinking in lean supply Read More

Levelling the Playing Field: How Companies Use Data for Competitive Advantage


Nearly all companies realize the way to gain a competitive advantage is to obtain better data, interpret them quickly, and distribute them in easier-to-use formats. But there are many obstacles to the effective use of data, resulting in unused corporate data in many companies. How are companies using information to beat their rivals and create a more level playing field? Find out how business practices are evolving to this end.

use ssl  Playing Field: How Companies Use Data for Competitive Advantage Nearly all companies realize the way to gain a competitive advantage is to obtain better data, interpret them quickly, and distribute them in easier-to-use formats. But there are many obstacles to the effective use of data, resulting in unused corporate data in many companies. How are companies using information to beat their rivals and create a more level playing field? Find out how business practices are evolving to this end. Read More

Microsoft Dynamics AX in Use-McDonald’s


RICC/McDonald, McDonald’s leading franchise in Saudi Arabia, was facing major operational issues, such as departments using different applications that offered negligible integration, reporting tools were limited, etc. The company chose Microsoft Dynamics AX 2009, a solution that covered more than 80% of its current future needs, and partnered with Alfanar IT for a successful implementation. See how alfanar IT did it.

use ssl  Dynamics AX in Use-McDonald’s RICC/McDonald, McDonald’s leading franchise in Saudi Arabia, was facing major operational issues, such as departments using different applications that offered negligible integration, reporting tools were limited, etc. The company chose Microsoft Dynamics AX 2009, a solution that covered more than 80% of its current future needs, and partnered with Alfanar IT for a successful implementation. See how alfanar IT did it. Read More

3 Key ERP Features and How to Use Them Effectively


Depending on the size and type of your business, your enterprise resource planning (ERP) solution may touch every department from accounting to warehouse management (WM). That can make it difficult to select the right solution for your company. But there are three critical modules an ERP system must have in order to deliver basic ERP benefits to any company, regardless of size or industry. Find out what they are.

use ssl  Features and How to Use Them Effectively Depending on the size and type of your business, your enterprise resource planning (ERP) solution may touch every department from accounting to warehouse management (WM). That can make it difficult to select the right solution for your company. But there are three critical modules an ERP system must have in order to deliver basic ERP benefits to any company, regardless of size or industry. Find out what they are. BEGINLYX� Read More

How to Use Lotus Domino to Publish Policies and Procedures Online


Does your company have a simple way to publish and maintain internal documentation? If people are using workarounds instead of reading documents on the corporate intranet, it’s a warning sign that there’s no appropriate publishing system in place. But there are alternatives and practical tips that can help you choose a cost-effective solution, based on the familiar Lotus Domino platform.

use ssl  to Use Lotus Domino to Publish Policies and Procedures Online Does your company have a simple way to publish and maintain internal documentation? If people are using workarounds instead of reading documents on the corporate intranet, it’s a warning sign that there’s no appropriate publishing system in place. But there are alternatives and practical tips that can help you choose a cost-effective solution, based on the familiar Lotus Domino platform. Read More

Business Process Management: A Crash Course on What It Entails and Why to Use It


Business process management (BPM) has to integrate existing enterprise applications, Web services, and people in such a way that it can also quickly change, destruct, or construct processes. This is far beyond the realm of traditional enterprise application integration (EAI).

use ssl  Entails and Why to Use It Integrated and Process-oriented Solutions Are Required for Competitiveness Integrated solutions that optimize only at a company- or department-level are no longer sufficient for success in today's highly competitive, integrated supply chain environment. Every department contains mountains of data, but without an integrated and process-oriented solution, all this valuable information is often lost to the company as a whole. What is needed is a real time solution that goes beyond i Read More

Monitoring How Your Assets Use Energy


To stay competitive in a rapidly changing market, organizations need to incorporate asset management capabilities that optimize not only their assets’ availability, performance, and quality, but also their energy consumption. Read this white paper to discover how adding an energy consumption component to your company's asset management systems can lead to big reductions in energy usage, a quick return on investment, and improved environmental conditions, as well as increased shareholder value and new market opportunities.

use ssl  How Your Assets Use Energy To stay competitive in a rapidly changing market, organizations need to incorporate asset management capabilities that optimize not only their assets’ availability, performance, and quality, but also their energy consumption. Read this white paper to discover how adding an energy consumption component to your company's asset management systems can lead to big reductions in energy usage, a quick return on investment, and improved environmental conditions, as well as Read More

How to Use Technology to Redefine Today’s Economy


Daniel Burrus examines how using technology can not only help organizations lower costs and become more efficient, but also redefine today’s economy. Learn the ways you can redefine your business and stay profitable.

use ssl  to Use Technology to Redefine Today’s Economy Today we’re in an era of technology-driven transformation. That means you can attain higher profits when you use technology to redefine your products, your services, and/or how the industry in general works. Unfortunately, most companies are using technology only one way—to lower costs and become more efficient. They view technology as a way to “do more with less,” “streamline the workflow,” and “trim expenses.” Sound familiar? While this i Read More

How NOT to Use Follow-up and Destroy Your Business


Until recently, there has been no solution to help manage the complex tasks involved with multistep, multimedia follow-up. People have been forced to come up with “creative” ways to get the follow-up done—which is why we now offer you … Six Highly Effective Ways You Can Effortlessly Destroy Your Business by Mismanaging Complex Prospect and Customer Follow-up!

use ssl  NOT to Use Follow-up and Destroy Your Business Until recently, there has been no solution to help manage the complex tasks involved with multistep, multimedia follow-up. People have been forced to come up with “creative” ways to get the follow-up done—which is why we now offer you … Six Highly Effective Ways You Can Effortlessly Destroy Your Business by Mismanaging Complex Prospect and Customer Follow-up! Read More

IBM Cognos 8 Business Intelligence for Use with SAP NetWeaver


The SAP NetWeaver infrastructure and applications have long been critical information pillars for some of the world’s largest and most successful companies. This demo script from IBM shows how companies can use IBM Cognos 8 with their existing SAP NetWeaver infrastructures. It includes scenarios for finance, IT, and business users, and follows specific steps to demonstrate functionality designed for each type of user.

use ssl  8 Business Intelligence for Use with SAP NetWeaver The SAP NetWeaver infrastructure and applications have long been critical information pillars for some of the world’s largest and most successful companies. This demo script from IBM shows how companies can use IBM Cognos 8 with their existing SAP NetWeaver infrastructures. It includes scenarios for finance, IT, and business users, and follows specific steps to demonstrate functionality designed for each type of user. Read More