X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 bios


Cooler-running Notebooks from HP, Toshiba, et al.
Recent announcements from AMD, Toshiba, and Phoenix highlight an increasing focus on extending the battery life of notebook computers.

bios  Technologies Ltd., a leading BIOS manufacturer, announced that PowerSuite 4.0 will allow notebooks to extend battery life by providing the ability to control both the speed and the voltage level of the notebook's CPU. The first products to use this will be part of Sony's VAIO product line. Early testing indicated battery life extension of around 18% when running one set of tests. Market Impact Although Intel currently controls the corporate notebook market, AMD is winning in the retail space. This will

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » bios

G-Log Offers New Start For CEO, Management Team


Global Logistics Technologies (G-Log) will soon launch its Internet-based logistics software business for the transportation industry. G-Log is a new beginning for CEO Mitchell Weseley.

bios  vendor in G-Log's executive bios, Manugistics. G-Log promises a new beginning for Weseley, who is hoping to put past misfortunes behind him. Market Impact Though Weseley's ability to attract top talent may make G-Log a success, it helped entangle him in a legal morass just a few years ago. Prior to G-Log, Mitchell Weseley was best known as the founder of his namesake, Weseley Software Development Company (WSDC). Incorporated in 1992, WSDC became the subject of litigation following its acquisition by Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

bios  biometric identification and authentication, BIOS level security, single sign-on and multi-factor security. A pioneer in identification technology, and a worldwide provider of Biometric authentication, Identix was founded in 1982, by then engineer Randy Fowler. Mr. Fowler has been credited with being the person to first patent image capture devices used for authentication purposes making Identix the original pioneer in fingerprint scanning technology. Retiring as CEO this year, Mr. Fowler still holds the Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

bios  develop hardware specs and BIOS extensions that will enable certain security services to the operating system. That's nice but if the operating system isn't good, security-wise, it won't matter what the hardware provides. If nothing else, the formation of this alliance is sure to heighten security awareness in the information technology sector as a whole. Elias Levy, Chief Technical Officer of Security Focus and moderator of the well-known Bugtraq security mailing list says, The alliance is a good idea Read More

Using Keyboard, Video, and Mouse over IP to Connect Remote Networks


Today’s IT professionals are often challenged by unrelenting changes in the enterprise, increased data growth and compliance regulations, and geographic distribution of assets, to name a few. Keyboard/video/mouse (KVM) over Internet protocol (IP) can help by providing an effective tool that can remotely manage servers—regardless of their physical location. When looking for a KVM over IP solution, you should consider some basic requirements first.

bios  conflict for remote access) BIOS level access to servers No limitations on locations of servers (across the room, across the globe) Simple and Non-Invasive. Any server management strategy should reduce complexity and lower the overall IT workload. Deployment, installation and usage of a server management solution should minimize or eliminate impact on the server, its operating systems, services and applications. The solution should offer: Simple and quick installation No special hardware (management Read More

Are Your Laptops Protected against Careless Employee Use?


The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets off the local area network (LAN), remotely deleting sensitive data, and physically recovering stolen computers.

bios  embedded support in the BIOS of a computer, the Computrace agent is capable of surviving operating system re-installations, as well as hard-drive reformats, replacements and re-imaging. More Information About Absolute Software Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking&8482; solutions. Absolute Software provides organizations and consumers with solutions in the areas of regulatory compliance, data protection and theft Read More

What’s Up with xTuple-and Open Source ERP?


You may be wondering how the open-source ERP vendor xTuple operating with a workforce of only 27 can compete on the same stage with the software giants. Find out how as TEC principal analyst P.J. Jakovljevic looks at xTuple’s current ERP offerings and commercial editions, and speaks with xTuple CEO Ned Lilly on the vendor’s social capabilities, product development focus, market and competitive landscape, and future outlook.

bios  http://www.erpgraveyard.com/ ). See xTuple’s bios of its top management as well as this article on Ned Lilly and the idea behind starting xTuple.   Our questions and Lilly’s answers are as follows: TEC: Has your market and competitive landscape changed as of late and how? What trends have you noticed in the market? NL: We're spending less and less time explaining the concept of open source and leading more with functionality and value with next-generation business management software. Then, when Read More

Wetmetrics


The Internet is having an identity crisis. Long regarded as a powerful tool for cost reduction and service enhancement, the Internet is falling short of its promise because of the real and perceived threat of identity theft. Financial losses and insurance costs are mounting, as organizations struggle to protect their information perimeters and improve the strength of their authentication systems to ensure that the authorized user is present during the sign-in process. The widespread use and misuse of passwords as authentication tokens is generally cited as a cause of the accelerating erosion of user confidence and the increasing incidence of identity theft. It is generally agreed that passwords are not enough. Much has been lost, however, in the race toward person-present authentication systems. While the application of passwords is fraught with risk, the introduction of complex authentication infrastructures and cumbersome end user technology has eroded usability and increased the cost of security dramatically. This paper describes a new authentication approach that retains the simplicity and low cost of passwords, while gracefully introducing as much person-present assurance as is required by the application.

bios  from the Greek words bios for life and metron for degree. Typically, biometrics implementations incorporate technologies for measuring static physiological characteristics like fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements or dynamic, behavioural characteristics like signature, gait, voice or typing. Static biometrics are relatively easy to measure, and the technology comparatively mature, with many competitive suppliers in the market. Implementation Read More