X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
 

 cyber alert


The Latest Phishing Threats and How to Stop Them
Learn about the latest phishing threats in Fraud Alert: Phishing The Latest Tactics and Potential Business Impact.

cyber alert  on all the ways cyber criminals are working hard to gain access to your company's confidential information —and what you can do to stop them. Phishing causes significant losses in dollars and reputation. Make sure it doesn't happen to you. Download your PDF copy of Fraud Alert: Phishing — The Latest Tactics and Potential Business Impact today. For assistance, please contact customer service. Hours: 8:00 AM to 5:30 PM EST. Phone: +1 514-954-3665, ext.367.

Read More


Discrete Enterprise Resource Planning (Discrete ERP) RFI / RFP Template

Financials, Human Resources, Manufacturing Management, Inventory Management, Purchasing Management, Quality Management, Sales Management, Product Technology Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...

Documents related to » cyber alert

Building a Business Case for Enterprise Spyware Protection


It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity.

cyber alert  and organizations like the Cyber Security Industry Alliance sounded the alarm about the hazards spyware poses to corporate networks and employee devices. In fact, spyware has become a serious enough matter to draw the attention of the United States Congress, where several bills are progressing toward approval. H.R. 2929, the Spy Act, places technological requirements upon spyware distributors, such as obtaining permission from users through a clearly worded licensing agreement. Spyware has become a Read More

Exact Software--Working Diligently Towards the "One Exact" Synergy Part Five: Market Impact (Continued)


While most traditional enterprise resource planning (ERP) solutions are task-driven, by adding structure to processes that are typically handled inconsistently or manually, Macola ES is process-driven. A truly integrated workflow and business process management (BPM) tool allows users to achieve long coveted IT objectives--the paperless office, management by exception, and workflow as electronic framework to guide employees.

cyber alert  ending up in a cyber-haven). Some worthwhile examples of how Macola ES defines business rules would be alerting the buyer when goods do not arrive on time from the supplier and even escalating alerts to the higher instances if the proper corrective action has not been taken by the buyer (alerting the VP of purchasing, for example). Examples how Macola ES manages exceptions include generating a workflow task or step to a sales representative when a customer stops buying, or alerting a customer service Read More

Baan Yet Another ERP Vendor to Find a Sanctuary Under Invensys’ Wing


On June 1, languishing Dutch ERP vendor The Baan Company finally found a 'knight in shining armor'. British automation equipment maker Invensys has agreed to pay $2.65 per share for Baan. The deal is valued at approximately $709 million.

cyber alert  the shop floor to cyber space). Baan offers ERP and e-business software, as well as customer relationship management (CRM) software from its acquisition of Aurum, and supply chain planning and execution software from its acquisitions of Caps Logistics and Berclain. Another Invensys division Wonderware also offers ERP software from its last year acquisition of Marcam Solutions, which is aimed at process manufacturers, whereas Baan's ERP system is primarily suitable for discrete manufacturers. Wonderware Read More

Outsourcing Security Part 1: Noting the Benefits


Without effective security, companies risk losing money and customer trust. With good security, companies have the power to maintain stakeholder value, customer loyalty, and competitive advantage. Faced with the complexity of providing effective security, many companies are turning to outsourcing.

cyber alert  in-house professionals, tracking new cyber threats, vulnerabilities, hacker techniques, and security developments removes them from other mission-critical activities that provide higher return on investment. Numerous organizations currently managing security in-house are looking for alternatives to overcome these obstacles. They want a way to maintain a strong security posture while focusing on core, revenue-generating e-business functions. Outside the Box For a growing number of organizations-large to Read More

Pearl Software Inc


Pearl Software, Inc., based in Chester Springs, PA, has grown from a one-man software developer founded in 1996 to a company whose core products are sold through several industry leading distribution channels and strategic partnerships. Pearl Software's Internet Management products are targeted to the business, education and consumer sectors. IDC projects the Internet Access Control Market to grow to $1.5 billion by 2005. Pearl Software provides network-enabled products to the growing Internet user community. It is company's primary goal to help the Internet grow as a commercial, educational and entertaining medium while providing a realistic means to protect the safety and privacy of those accessing it. Pearl Software's key patent pending-products include company's leading Internet Management products, Pearl Echo and Cyber Snoop Desktop.

cyber alert  products, Pearl Echo and Cyber Snoop Desktop. Read More

Netpliance’s 4X Price Hike - Will It Spell Boom or Doom?


Netpliance, Inc., whose i-opener could be considered the first Internet appliance, recently added functionality, but also decided to raise its hardware “membership kit” price from $99 (down from its normal $199) to $399, in an effort to get profits from more than its online services. Will people be willing to pay an extra $300 for the privilege of using a 10-inch display?

cyber alert  4X Price Hike - Will It Spell Boom or Doom? Netpliance’s 4X Price Hike - Will It Spell Boom or Doom? R. Krause - July 24, 2000 Event Summary June 29, 2000 [Source: Netpliance press release] Netpliance, Inc. has announced i-opener 2001, the next generation service for Internet appliances. As part of the new service package, i-opener customers will be able to alert one another and chat live for the first time with iChime Direct Messaging using an i-opener Internet appliance. Adding to its Read More

Reducing Operational Risk of IT Service in Finance


An overview for CIOs of the provision and management of IT services at a level that addresses the risk management issues raised by the Basel Committee's New Capital Accord expected to become effective during 2006. Because of the dependence financial institutions have on IT services, the accord requires adequate provision to assure the availability of these services. Centauri Business Service Manager is presented as the solution: one that allows a CIO to assess current risk levels, measure ongoing risk and support a process of ongoing improvement to reduce this risk. Furthermore, Centauri provides the financial institution with a cost-effective balanced scorecard to improve decision-making.

cyber alert  Operational Risk of IT Service in Finance Reducing Operational Risk of IT Service in Finance If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Compuware Acquires Proxima Technology. In January 2007, Compuware acquired Proxima Technology. Compuware IT Service Management provides an end-to-end view of application performance while helping communicate the business value of IT services, and proactively identifying and resolving Read More

Facebook Eyeing Enterprise Social Networking


The Financial Times reports that Facebook is secretly developing a social Web site for the enterprise called "Facebook at Work"—allowing users to keep their personal profile separate from their professional profile. Get the details in P.J.'s write-up.

cyber alert  Eyeing Enterprise Social Networking Facebook is secretly developing a new business-oriented social Web site called Facebook at Work that will allow users to keep their personal profile separate from their professional profile reported the Financial Times. The new site will look very much like the “personal” Facebook, with a newsfeed and groups, and will allow users to chat with colleagues, connect with professional contacts, and collaborate over documents and processes.   Facebook's new Read More

Security Risk Assessment and Management in Web Application Security


Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.

cyber alert  systems to hackers and cyber crooks trying to steal proprietary corporate intellectual property, including sensitive customer information. An ever-growing list of government regulations aimed to ensure the confidentiality, integrity, and availability of many types of financial and health-related information is also increasing IT risks and making a comprehensive security risk assessment a modern day corporate necessity. But how do organizations perform an accurate security risk assessment of their IT Read More

Blackboard to Offer Anti-bullying Texting Service for K-12 Schools


Blackboard has announced the launch of TipTxt, a two-way free-of-charge texting service that allows students to confidentially notify school officials of activity related to bullying or school safety. The service can be made available to every public, private, and parochial K-12 school in the United States. Blackboard has invited the National Parent Teacher Association (National PTA) to reach out

cyber alert  to Offer Anti-bullying Texting Service for K-12 Schools Blackboard has announced the  launch of TipTxt , a two-way free-of-charge texting service that allows students to confidentially notify school officials of activity related to bullying or school safety. The service can be made available to every public, private, and parochial K-12 school in the United States. Blackboard has invited the National Parent Teacher Association (National PTA) to reach out to its wide network of parents and te Read More

Qwest Cyber.Solutions: “A Number 3 Please, and Make It Grande”


Qwest Cyber.Solutions unveiled a new product portfolio for sector specific ASP solutions. The QCS Enterprise Freedom™ product suite is designed to offer flexible, fast, reliable platform solutions. The company has packaged their ASP products, to serve as the foundation for solutions offered to the finance, communications, healthcare and services sectors.

cyber alert  Cyber.Solutions: “A Number 3 Please, and Make It Grande” Qwest Cyber.Solutions: A Number 3 Please, and Make It Grande A. Turner - June 8 , 2000 Event Summary In May, Qwest Cyber.Solutions LLC, (QCS), an Application Service Provider (ASP) announced its strategy to deliver ASP solutions designed for key market sectors. The company has packaged a suite of ASP products, called Enterprise Freedom, to serve as the foundation for solutions offered to the finance, communications, healthcare, and Read More

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

cyber alert  Cybercrime on the Internet Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information Read More

Dabur Selects Ramco HCM


The number of multinationals and Fortune companies embracing Ramco Systems’ human capital management (HCM) solution has been on the rise of late. Ramco recently roped billion dollar fast-moving consumer goods (FMCG) major and India's largest Ayurvedic medicine manufacturer, Dabur India Limited.

cyber alert  industry watch, HCM solution, HR solution, talent management, payroll functionality, human capital management Read More

Fault Meets Performance -- Comprehensive Infrastructure Management Part 1: The Problem


Customers, suppliers, partners and other business needs dominate IT decision making, so when these business partners complain about slow applications or interminable downloads, IT listens – or else. Catching and correcting the innumerable faults and performance problems that bring down IT environments is more important than ever.

cyber alert  Meets Performance -- Comprehensive Infrastructure Management Part 1: The Problem Introduction As recently as a year ago the mantra just keep it running drowned out every other voice in the information technology (IT) universe. Corporate IT infrastructures had become so mind-numbingly complex that staff had everything it could do just to keep everything running - never mind how well it might have been running. When employees complained about performance, IT staff was not responsive. Unfortunately, Read More