X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 512 rdram


Lexiguard&;: The Coming
A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price

512 rdram  with a keysize of 512 up to 2048 bits. All encrypted files are self-signing, and there is no need for a Certification Authority intermediary. It supports LDAP, groups, Netscape 4.x, and IE 4.0, and 5.0 and has a command line interface for those UNIX geeks who have come to loathe GUIs with point-and-click-only attitudes. Market Impact VPNs have proved to be difficult to implement, even for the most accomplished security and network engineers. You just don't launch a VPN overnight. Lexiguard uses a desktop

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » 512 rdram

Applix Still Shows a Presence in the OLAP Market


Applix Inc. has announced an agreement with Pelephone, Israel's second largest cellular network and handset supplier, to deliver its real-time, multi-dimensional On-Line Analytical Processing (OLAP) solution, iTM1 to analyze customer profiles for over 1.2 million Pelephone subscribers.

512 rdram   Read More

Choosing a Solution for Web Filtering: Software, Appliance, Managed Service?


There are three types of web security solutions: software-based, appliance-based, and managed services. Each needs to be evaluated against several key buying criteria, including the accuracy of threat protection, ease of installation and use, and total cost of ownership (TCO). Learn about the benefits of each category, and how they deal with all manner of web-borne security threats, including inappropriate use of the Web.

512 rdram   Read More

Employee Web Use and Misuse: Companies, Their Employees, and the Internet


The Internet creates new opportunities for mischief—and new challenges for managers. How do you balance individual access with the overall good of the business? What’s the right balance between monitoring and blocking? Learn about a Web security solution that can allow you to monitor and enforce your Internet usage policies, bringing site monitoring and filtering together with anti-virus and anti-spyware protection.

512 rdram   Read More

The Top 3 Myths about Requirements Management and Real-world Advice for How to Dispel Them


Are you on the front lines of product development and project management, and tired of seeing the same project failure statistics? Are you ready to do something to change your approach to requirements management? Then read about the three most common myths (plus a bonus myth) associated with requirements management, and how you can dispel them once and for all—for more successful products and project outcomes.

512 rdram   Read More

Intel Faces 820 Chipset Problems (Again)


In the latest round of setbacks to beset Intel’s performance-oriented 820 chipset, the manufacturer announces a recall of nearly a million motherboards shipped in 1999 & 2000.

512 rdram   Read More

7 Steps to a Successful IP Telephony Implementation


Enterprises of all sizes are adopting Internet protocol (IP) telephony for cost savings and productivity gains—but high quality voice service takes more than just buying the latest equipment. Is IP telephony right for your organization and your network? Get the straight facts from an industry leader—along with a 7-step assessment and deployment checklist for a successful implementation.

512 rdram   Read More

IP Telephony 201: The Nuts and Bolts of VoIP


In IP Telephony 101, I looked at the pros and cons of IP telephony, and a few of the considerations you should explore before making the switch to VoIP. We’ll turn now to the nitty-gritty of VoIP systems: the architecture, the equipment, the network structure, the software, and what you can expect to pay. But before we start, let’s get WAN and LAN out of the way. A LAN (local area

512 rdram   Read More

IBM Updates the Netfinity Line


IBM finally seems to have gotten the message of “smaller is better” when it comes to rackmount servers with the introduction of three new models to its Netfinity line of Intel-based servers

512 rdram   Read More

Intel Tries to Give it Away - AMD Says "No Way"


Intel Corp. has disclosed a problem involving its 820 and 840 chip sets that has spurred the company to scrap plans for three motherboards it had on its server road map.

512 rdram   Read More




512 rdram   Read More