X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 disable cache


Single Sign-on (SSO): Truths and Myths
Technology products always seem to come out strong, and then wither under intense scrutiny. This was the case with single sign-on (SSO). However, any product

disable cache  a consolidated place to disable and/or terminate users. With the many odds-and-ends applications out there, it can be extremely difficult to identify all of a user’s accounts when he or she leaves the company. Because SSO requires this kind of reconciliation and matching, an enterprise receives better assurance that the outgoing user’s accounts have all been disabled. The final way that SSO reduces risk is to create a central location for login/logout activities. By reviewing these logs,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » disable cache

E*Trade Ignores Private Security Warning, But Public Hullaballoo Gets Response


E*Trade was notified about a cookie vulnerability in August, but the correction wasn't made until after the problem became public.

disable cache   Read More

Cache Poisoning Raises Cash Crop for DNS Pharmers


To understand the power of cache poisoning and pharming, imagine that you’re logging on to your Internet banking service. The page looks a little odd, but the address is correct, and it has the same fields as usual. You might enter your credentials without thinking twice. Unfortunately, you’ve just provided a criminal syndicate with the contents of your bank account.

disable cache   Read More

Salesforce.com Forms a Venture Capital Investment Fund


Salesforce.com has set up the Salesforce1 Fund, a venture capital fund designed to fuel the creation of mobile apps. Salesforce has reportedly already allocated $100 million for the fund to invest in companies building innovative mobile apps and products connected to the Internet of Things (IoT) that extend the power of the Salesforce1 platform.

disable cache   Read More

Surf's Up at Akamai


Akamai has unveiled a killer IPO in a mere 14 months. Its innovative product called FreeFlow delivers website content at stellar speeds. Will it be able to deliver revenue at the same speed it can deliver content?

disable cache   Read More

Secure Your Search Engine


Webservers running the search engines are vulnerable to a serious security compromises. Without careful implementation, user passwords and logins can be stolen, and the entire server could be brought to its knees by hackers.

disable cache   Read More

JDA Portfolio: For the Retail Industry Part Four: More JDA Portfolio 2004.1 and Microsoft Alliance


JDA Portfolio 2004.1products have been developed or acquired by JDA in order to present customers with an enterprise offering that might currently be the broadest, most functional set of industry leading retail demand chain software solutions available to retailers and their suppliers.

disable cache   Read More

In-Memory Analytics: A Multi-Dimensional Study


The primary bottleneck to high-performance multidimensional analysis has been slow hard drive speed—the time it takes for data to be transferred from disk storage to random access memory (RAM). With crashing RAM prices and 64-bit addressing, in-memory architecture provides new and innovative solutions for online analytical processing (OLAP). This article looks at why and how in-memory technology transforms analytic applications for BI.

disable cache   Read More

E-mail 101


The first e-mail programs were created in the late 60s/early 70s—simpler times, when everyone on the network was trustworthy. Even knowing what we know today about spammers, we still tend to take e-mail for granted, and trust it far more than it deserves. Learn about the components of the e-mail system, understand how e-mail moves on the Internet, and find out how to interpret e-mail message headers.

disable cache   Read More

Better Visualization and Performance with Pentaho Business Analytics 4.5


On April 25, Pentaho delivered Pentaho Business Analytics 4.5, and I had a chance to get a sense of its new features via a demo prepared by Pentaho. Two main topics were at the forefront of this new offering from the Orlando-based company: visualization and performance. The enhancements made to this version are reflected in visualization capabilities such as geo-mapping features

disable cache   Read More

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)


DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Read this white paper to find out all of the scary details about these attacks and what you can do to prevent them.

disable cache   Read More