X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 extreme hacking


Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards
Original News & Educational ReviewCourse SummaryErnst & Young, has put together the quintessential course for security engineers looking to improve their

extreme hacking  but how hackers think. eXtreme Hacking is for all intent purposes, a course on how to audit the security of an information technology network by not only learning what tools to use, but taking into consideration hacking strategies, and how hackers think. Company Background Ernst & Young LLP, best-known for its traditional tax and audit services, has with extreme Hacking, taken auditing to a new level. Figure 1: Ernst & Young Corporate Information Headquarters 787 7th Avenue New York, NY 10019 Trading

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » extreme hacking

E&Y Spins-Off eSecurity Online and Unveils Security Vulnerability Assessment Services


In an effort to assist corporations in preventing security related losses, Ernst & Young announced that it is spinning off a new online security venture. The new venture's lead product line is their Security Vulnerability Assessment service.

extreme hacking   Read More

Project Lifecycle Management Implies Long Term Value; Forget the Total Cost of Ownership Fuss


Understanding the nature and specifics of your product development life cycles, and especially new product design and initiation, can help you realize tangible cost savings and will offset the total cost of ownership of a product lifecycle management system.

extreme hacking   Read More

Is Baan Clinically Dead?


On January 4, 2000 Baan, Europe's No. 2 business software company, sank deeper into trouble as its CEO resigned and it forecast a fourth quarter loss of $240 million to $250 million after restructuring. Its shares plunged over 30 percent as analysts cut recommendations on the loss-making vendor, which has yet to name a replacement for Mary Coleman, who is returning to her Silicon Valley home after taking charge only last May.

extreme hacking   Read More

Oracle Releases Oracle Solaris 11.1


During its Openworld event, Oracle announced the release of Oracle Solaris 11.1 to deliver enhancements in features and performance. Some of the outstanding enhancements of this new Solaris version are its capabilities for building large-scale infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) clouds for both SPARC and x86 processor-based servers, as well as extreme

extreme hacking   Read More

Talking to Software CEO Who Only Succeeded by Failing a Few Times


Adriaan van Wyk is the CEO of K2, a software vendor that creates and helps run business applications, including forms, workflow/business process management (BPM), data, and reports. van Wyk and his co-founders have grown K2 from a small South African start-up into a global company whose software is used by millions of people and more than a dozen Fortune 100 companies. TEC's P.J. Jakovljevic talks with van Wyk one-on-one about his leadership style and philosophy and who has inspired him along his path to success.

extreme hacking   Read More

Are ERP Workarounds a Terrific Way of Shooting Yourself in the Foot?


Are ERP workarounds a terrific way of shooting yourself in the foot? TEC Analyst Gabriel Gheorghiu says “There’s no way to avoid ERP workarounds. And yes, they’re a problem.” TEC Analyst Jorge García says “No they’re not.” Managing Editor David Clark attempts to moderate (just a wee bit too late).

extreme hacking   Read More

TIBCO and Teradata Partner to Deliver Extreme Data Discovery and Analytics


TIBCO and Teradata announced that they will combine technologies to offer a new platform for advanced analytics and extreme data discovery capabilities. Combining Teradata’s Enterprise Data Warehouse and TIBCO Spotfire 5, both software and technology providers will be able to expand their product capabilities to provide faster and more powerful data analysis tools for large volumes of information.

extreme hacking   Read More

They Can Run, But You Can’t Hide


Politicians are reputedly experts at reinterpreting past statements in the face of current realities. A minor flap about one of them reveals a new way that the Web may impact politics (and business).

extreme hacking   Read More

Xchange Adds To The List Of CRM Point Solutions' Casualties


Xchange's protracted troubles and its recent inglorious demise and subsequent auctioned sellout may prove the fact that the CRM point providers without a clear differentiating value proposition and without enough resources have not much to look for out there in the long run other than to find an honorable exit strategy.

extreme hacking   Read More

Oracle Delivers In-Memory Value Chain Planning Solutions


Each of many Oracle In-Memory Applications on Oracle Engineered Systems is designed for a specific business purpose to transform an enterprise’s business processes, accelerate its activities, and help it become information driven. When Oracle develops new In-Memory Applications, it looks first at what particular problems need solving, and what is the best way to solve them. Once Oracle has defined

extreme hacking   Read More

Study Shows: FBI Alienates Industry Security Experts


A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best industry security professionals want nothing to do with helping the FBI resolve cybercrime. Recently, one of the leading Department of Justice attorneys general, well-known for expertise in successfully prosecuting cybercrime, asked TechnologyEvaluation.Com why so many security and information technology professionals snub their noses at law enforcement agencies that exist to protect our nation's vital assets - private and public. TechnologyEvaluation.Com went behind the scenes to find o

extreme hacking   Read More

Oracle


Founded in 1977, Oracle Corporation (NASDAQ: ORCL) offers its database, tools, and application products, along with related consulting, education, and support services, to more than 400,000 customers in more than 145 countries around the world. Today, Oracle is all about simplifying: shifting the complexity from IT, moving it out of the enterprise by engineering hardware and software to work together—to reside in the cloud and in the data center. By eliminating complexity and simplifying IT, Oracle enables its customers to accelerate innovation and create added value for their own customers. By engineering out the complexity that stifles business innovation, Oracle is engineering in speed, reliability, security, and manageability. The result is robust products throughout an integrated stack of hardware and software, with every layer designed and engineered to work together according to open industry standards. Oracle's complete, open, and integrated solutions offer extreme performance at a low cost. Integrated, industry-specific solutions are also engineered to address complex business processes across a wide range of industries. For customers needing modular solutions, Oracle's open architecture and multiple operating system options provide benefits from its products in every layer of the stack. This allows customers to build the most optimized infrastructure possible for their enterprise.

extreme hacking   Read More

IP Telephony 201: The Nuts and Bolts of VoIP


In IP Telephony 101, I looked at the pros and cons of IP telephony, and a few of the considerations you should explore before making the switch to VoIP. We’ll turn now to the nitty-gritty of VoIP systems: the architecture, the equipment, the network structure, the software, and what you can expect to pay. But before we start, let’s get WAN and LAN out of the way. A LAN (local area

extreme hacking   Read More

Stock Build Optimization in Food and Beverage Manufacturing: Are Your Profits Suffering Due to Stockouts or Expired Stock?


For food and beverage manufacturers, the failure to meet demand peaks can result in poor customer service, lost revenue, stockouts, brand erosion, and—in extreme cases—being delisted by a major customer. However, with stock build optimization, manufacturers can minimize the time and total value of the stock being held, and realize higher profits and working capital.

extreme hacking   Read More