X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 criminal investigations


Not Just Words: Enforce Your E-mail and Web Acceptable Usage Policies
Unmanaged employee use of e-mail and the Web can subject your organization to costly risks including litigation, regulatory investigations, and public

criminal investigations  related to civil and criminal investigations into the marketing of the antipsychotic drug Zyprexa. With negotiations over Lilly's alleged marketing improprieties reaching more than $1 billion (in addition to the $1.2 billion Lilly had already paid to settle 30,000 individual lawsuits), the pharmaceutical giant was eager to keep the settlement talks under wraps. Given the secrecy surrounding the negotiations, company officials were understandably shocked when contacted by a reporter preparing to publish

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » criminal investigations

Los Alamos Loses Top-Secret Information, Again!


Another security compromise occurred at Los Alamos National Laboratories last month when two hard drives containing top-secret nuclear information disappeared. The security mistakes that are being made at Los Alamos are sloppy and unacceptable.

criminal investigations   Read More

Study Shows: FBI Alienates Industry Security Experts


A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best industry security professionals want nothing to do with helping the FBI resolve cybercrime. Recently, one of the leading Department of Justice attorneys general, well-known for expertise in successfully prosecuting cybercrime, asked TechnologyEvaluation.Com why so many security and information technology professionals snub their noses at law enforcement agencies that exist to protect our nation's vital assets - private and public. TechnologyEvaluation.Com went behind the scenes to find o

criminal investigations   Read More

BI Principles for Another Kind of Intelligence


Traditional business intelligence (BI) and analytics applications aim to support the decision-making process of a company. By analyzing large amounts of data, most BI applications provide the means for making business-oriented decisions. This includes studying the data from the perspective of improving the business and generating more business. Most intelligence applications follow

criminal investigations   Read More

How to Defend Against New Botnet Attacks


In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack.

criminal investigations   Read More

SoftBrands' Recovery Softens the AremisSoft Bankruptcy Blow


SoftBrands believes it has finally repositioned itself for growth going forward by capitalizing on the reputation of Fourth Shift, coming to an arrangement with SAP Business One, and introducing more reliable versions of its hospitality software products.

criminal investigations   Read More

Are Your Laptops Protected against Careless Employee Use?


The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets off the local area network (LAN), remotely deleting sensitive data, and physically recovering stolen computers.

criminal investigations   Read More

Controlling Complex Trade Promotion Management Issues For Suppliers To The Retail Chains


Almost $75 billion (USD) is spend on trade and promotion funds every year. Unfortunately most enterprise resource planning (ERP) systems are not equiped to handle the complexities of promotion causing false reports and inaccurate invoices. Small and medium businesses (SMB) have had limited choices, until now.

criminal investigations   Read More

Leave No Farmer Behind


Insights on the evolving policies and socioeconomics of the two largest countries in the world--China and India--and the impact for global business.

criminal investigations   Read More

How Some ERP Vendors Demonstrated - Warts And All Part 2: Results


This is part two of a case study from a recent selection engagement for an ETO mid-size manufacturer; we assess Oracle, J.D. Edwards, SAP, and IFS in terms of their ability to demonstrate alleged functionality of their products.

criminal investigations   Read More

The Business Case for Tokenization


Tokenization is a new type of technology that is being used by companies to reduce the risk of losing sensitive data to identity thieves. This paper discusses how you can make practical use of tokenization to reduce your risk. Additionally, this paper discusses specific target applications in your organization that you should consider for an implementation of tokenization.

criminal investigations   Read More