Home
 > search for

Featured Documents related to » computer silicon valley



ad
Get Free HR Systems Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » computer silicon valley


Gates Previews Pen-Based Computer
Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

COMPUTER SILICON VALLEY: Gates Previews Pen-Based Computer Gates Previews Pen-Based Computer R. Krause - November 15, 2000 Read Comments R. Krause - November 15, 2000 Event Summary November 13, 2000 Microsoft chairman Bill Gates used his keynote speech at Comdex to unveil a proof of concept system Microsoft calls its Tablet PC . The Tablet is a little over two pounds, and expected to be around the size of a legal pad. Gates apparently believes pad/tablet PCs and pen-based computing are the next big thing(s) in the PC
11/15/2000

Geac Computer Corporation: Mastering Growth by Acquisitions
Geac has acquired in excess of 40 companies around the world. Geac's purchase of UK-based ERP software maker JBA International in 1999 has nearly doubled the company's size.

COMPUTER SILICON VALLEY: Geac Computer Corporation: Mastering Growth by Acquisitions Geac Computer Corporation: Mastering Growth by Acquisitions P.J. Jakovljevic - March 1, 2000 Read Comments Vendor Genesis Geac Computer Corporation Limited manufactures, services, and rents systems, hardware, and enterprise applications to large and small organizations worldwide. Geac is the largest Canadian and one of the largest and most successful international software companies. Its solutions are specifically designed for the critical needs
3/1/2000

Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has previously failed to make inroads in the consulting arena, and they feel e-business is the way to fix the problem.

COMPUTER SILICON VALLEY: Computer Associates Goes E-Business in a Big Way Computer Associates Goes E-Business in a Big Way M. Reed - April 27, 2000 Read Comments M. Reed - April 27th, 2000 Event Summary Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. In addition to product integration with the Jasmine ii product, the acquisition of Sterling Software, and the reorganization of their service and sales staffs, they are focusing on
4/27/2000

What’s Up with Computer Associates?
In a series of radical moves, Computer Associates appears to be trying to re-direct its gargantuan operations. After missing its numbers in the first calendar quarter (CA’s 4th fiscal quarter), its stock was down 59% at one point.

COMPUTER SILICON VALLEY: What’s Up with Computer Associates? What’s Up with Computer Associates? M. Reed - October 24, 2000 Read Comments M. Reed - October 24, 2000 Event Summary In a series of radical moves, Computer Associates (NYSE: CA) appears to be trying to re-direct its gargantuan operations (it is the third largest software firm in the United States, behind Microsoft and Oracle). After missing its numbers in the first calendar quarter (CA s 4th fiscal quarter), its stock was down 59% at one point. Here is a partial
10/24/2000

Vulnerability Assessment: The Right Tools to Protect Your Critical Data
Vulnerability assessment (VA) has become one of the hottest fields within computer security. VA tools are designed to detect and report on security holes within software applications, allowing organizations to take corrective action—before devastating attacks occur. Indeed, due to reduction in hacker “time to exploit,” along with intense regulatory pressures, the need for reliable VA has never been greater.

COMPUTER SILICON VALLEY: the hottest fields within computer security. VA tools are designed to detect and report on security holes within software applications, allowing organizations to take corrective action—before devastating attacks occur. Indeed, due to reduction in hacker “time to exploit,” along with intense regulatory pressures, the need for reliable VA has never been greater. Vulnerability Assessment: The Right Tools to Protect Your Critical Data style= border-width:0px; />   comments powered by Disqus Related
3/8/2007 2:29:00 PM

Technology Challenges of Distributed, Multiplayer Virtual Environments
To play any popular online computer game, all a user needs is a computer and an Internet connection. But there’s a lot more going on behind the scenes than this gamer may realize. In order to interact in a shared virtual environment, the system the user connects to requires technology capable of creating, operating, and modifying persistent, distributed, three-dimensional virtual worlds.

COMPUTER SILICON VALLEY: play any popular online computer game, all a user needs is a computer and an Internet connection. But there’s a lot more going on behind the scenes than this gamer may realize. In order to interact in a shared virtual environment, the system the user connects to requires technology capable of creating, operating, and modifying persistent, distributed, three-dimensional virtual worlds. Technology Challenges of Distributed, Multiplayer Virtual Environments style= border-width:0px; />   comments
7/12/2007 1:25:00 PM

CSC (Computer Sciences Corporation)


COMPUTER SILICON VALLEY: For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations.

CyberPeepers from Korean Sites Peek at U.S. Networks
Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom you ask, and how far into your infrastructure they get.

COMPUTER SILICON VALLEY: A rootshell is a computer account with special privileges that empower the user to completely take over and own the system. On January 8th, a hacker using the handles Hi There and Timothy writing from the account whymeh@kornet.net made an offer on various Internet hacking newsgroups to pay $20,000 for hacking assistance. Kornet is one of the Republic of Korea s leading Internet Service Providers. The hacker wrote, I am writing this email in the hope that I could find anyone who has the ability to
2/4/2000

Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake
Dell Computer Corp. chairman Michael Dell said Thursday the company's financial performance should not be affected by September's earthquake in Taiwan.

COMPUTER SILICON VALLEY: 7, 1999[Reuters] -- Dell Computer Corp. chairman Michael Dell said the company s financial performance should not be affected by an earthquake that knocked out industrial production in Taiwan last month. He said Taiwanese computer parts plants damaged in the September 21 temblor quickly resumed production and Dell, the world s second largest personal computer seller, had used its market muscle to assure a steady stream of computer chips. In terms of Q3 (third quarter) specifically, I think we re going
10/13/1999

Non-restrictive Technology in Computer-based Businesses and Services
Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated.

COMPUTER SILICON VALLEY: public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated. Non-restrictive Technology in Computer-based Businesses and Services style= border-width:0px; />   comments powered by Disqus Related Topics:   Security,   Access Control,   Identity Management/User Provisioning,   Network Security Monitoring,  
4/9/2007 6:50:00 PM

Software Evaluation Guide—Key Characteristics to Look for in a Business System for the Wire and Cable Industry
As a wire and cable manufacturer, you probably already have a computer system in place that you couldn’t operate without. However, this system may be outdated, or may not provide the capabilities you need. But moving to a new enterprise-wide business system is an important step—one you can’t afford to take lightly. What, exactly, do you look for?

COMPUTER SILICON VALLEY: Cable Industry Source: Consona/AXIS Computer Systems Document Type: Checklist/Guide Description: As a wire and cable manufacturer, you probably already have a computer system in place that you couldn’t operate without. However, this system may be outdated, or may not provide the capabilities you need. But moving to a new enterprise-wide business system is an important step—one you can’t afford to take lightly. What, exactly, do you look for? Software Evaluation Guide—Key Characteristics to Look
5/14/2007 4:58:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others