X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 100 laptops


Are Your Laptops Protected against Careless Employee Use?
The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets

100 laptops  that only one in 100 employees consistently follows corporate data and security policies. Physical Security and Authentication The simplest form of laptop computer security involves protecting the computer and its physical environment. According to Research Concepts, more than 31% of organizations surveyed provide laptop users with cable locks to secure their computers when out of the office. Nearly 94% reported the use of password-based authentication on laptop computers. Interestingly, this same survey

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, IT Infrastructure

The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical types of activities that these providers perform include data center operations; network operations; backup/recovery services, data storage management services; system administration services; end user support of desktop PCs, laptops, and handheld devices; web site, or application hosting, etc.  

Evaluate Now

Documents related to » 100 laptops

Compaq to Halt NT on Alpha Development


Compaq Computer Corp. this week laid off roughly 100 engineers responsible for developing Windows NT/2000 on the Alpha platform, several informed sources said. [Note: Compaq has only discussed the 32-bit version of NT, it is still unclear whether this announcement also affects 64-bit Windows.]

100 laptops   Read More

Desktop Management's Dirty Little Secret


ESD (electronic software distribution) promises to simplify software distribution and management, and eliminate ''sneakernet'' the costly, time-consuming manual process that some companies still use to do upgrades and installations. Unfortunately, the cure often has some of the same pitfalls as the problem, not to mention a few snags of its own.

100 laptops   Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

100 laptops   Read More

Lost Your Laptop? The CyberAngel® Brings It Back


A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an affordable laptop recovery package is well worth the investment.

100 laptops   Read More

Forte Wares


Forte Wares is the solutions division of Forte Consultancy Group, which has delivered more than 100 analytics-driven projects to leading organizations across the EMEA region. We act as a true one-stop-shop for analytics – from consultancy to implementation, human resources to software.

100 laptops   Read More

E2open Business Network Surpasses 100,000 Registered Users


E2open is a provider of cloud-based software solutions enabling enterprises to procure, manufacture, sell, and distribute products more efficiently through collaborative execution across global trading networks. Brand owners can use E2open solutions to gain visibility into and control over their trading networks through the real-time information, integrated business processes, and advanced

100 laptops   Read More

Case Study: Procter & Gamble


Procter and Gamble has operations in over 70 countries and more than 100,000 employees worldwide. Due to the competitive global consumer products industry, P&G faced the challenge of quickly sharing new product information and building skills in key areas—on disparate learning management systems (LMSs). Read about the LMS the company implemented for a faster pace of global learning and time to market, and reduced costs.

100 laptops   Read More

Supply Chain Planning - Issues for Continuous Chemical Companies


The continuous chemical industries typically share an objective of running at near 100% utilization. This and other realities yield unique requirements for a Supply Chain Planning (SCP) system. This article discusses some of these unique needs.

100 laptops   Read More

Process ERP Market Loses PRISM and Protean


Wonderware is reducing the staff dedicated to the ex-Marcam PRISM and Protean products from approximately 400 to less than 100. They will also cease to offer these products, but have indicated a transition to a new product. What impact will this have on existing customers and the Process ERP marketplace?

100 laptops   Read More