Home
 > search for

Featured Documents related to » g hacking research



ad
Get Top HR Software Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » g hacking research


OS SmackDown!
In the latest escalation in the battle between Windows and Linux, directions on how to replace each with the other have been published on the Web by their respective champions.

G HACKING RESEARCH: Linux-philes have countered by publishing instructions on how to remove a Windows OS and replace it with Linux. To close the circle, Paul Ferris, Editor at Linux Today, highlighted the silliness by publishing his own mostly-joking piece on how to uninstall both Windows and Linux. (His directions lead to a wiped out disk drive, of course.) Market Impact Alone, these documents will have minimal market impact, except to provide fodder for the pros/antis on both sides to complain about the other and their
1/12/2000

What is SRFM?
The planning, execution and partner collaboration processes of nearly all companies today are driven by a

G HACKING RESEARCH: Read Comments Introduction The planning, execution and partner collaboration processes of nearly all companies today are driven by a plan , itself typically part forecast, part performance target. Together, the plan and these core processes are at the heart of almost everything a company does—from MRP output, to commitments to customers and suppliers, to internal performance targets and the bonuses that depend on them, to the financial projections delivered to Wall Street. The day to day activities
4/23/2004

Usability
Poor usability leads to irritation and fatigue and it has an adverse impact on the usage experience. In an on-line shopping web site, it can lead to loss of revenues. Poor usability in business applications leads to increased help desk costs. On the other hand, better usability makes our usage experience more fun and can increase productivity. A highly usable on-line shopping web site tempts repeat visits, builds customer loyalty, and increases its revenue-earning potential.

G HACKING RESEARCH: have been several reasons given over the years to explain the success of Microsoft s software products. Rarely has usability featured in these discussions. Many of us would recall how painful it was to draw a table in WordStar or WordPerfect . Microsoft Word made it simple, intuitive and fun to draw tables. The same goes for text formatting, mail merge, envelope printing, and so on. Extra wide screens in many software packages force users to scroll horizontally. As a result, speed suffers because users
2/15/2004

I Want My Private Cloud
Do you want your private cloud? Read about benefits and drawbacks for organizations considering the adoption of a private cloud computing strategy. Although many organizations are considering reaping the benefits of a cloud computing platform, they have concerns with the handling of sensitive information on a public cloud platform. An alternate option is available, and it means having our own private cloud. This article discusses aspects of private cloud computing and its advantages and drawbacks for organizations considering the adoption of a private cloud strategy.

G HACKING RESEARCH: Want My Private Cloud Jorge García - January 20, 2011 Read Comments Although many organizations are considering reaping the benefits of a cloud computing platform, they have concerns with the handling of sensitive information on a public cloud platform. An alternate option is available, and it means having our own private cloud.   Introduction A few months ago, I had the opportunity to write an article on cloud computing titled A Tour of the Clouds , where I provided general descriptions of the basic
1/21/2011 9:42:00 AM

Leave No Farmer Behind
Insights on the evolving policies and socioeconomics of the two largest countries in the world--China and India--and the impact for global business.

G HACKING RESEARCH: 31, 2004 Read Comments Liberalizing the Global Economies While the US sports our leave no children behind , which ultimately could impact US competitiveness, by making sure we educate our youth to a higher standard , Asia problems are more systemic. The economic engines on China and India that so dazzled and frighten the US have left the rural populaces out of the picture. In fact, rural citizens are literally willing to live on the streets of the big cities in order to get a crack at a job-any job-in
7/31/2004

SCM Software for Mills
Demand for mill products especially in the metals and packaging industry is growing fast. This presents a good opportunity for the software vendors who cater to the needs of customers in these industries.But these industries have some unique requirements which are discussed throughout this article. Supply chain management software which does planning and execution for manufacturing, transportation, distribution etc. for mills industry, needs to address these unique requirements.

G HACKING RESEARCH: typical process or discrete manufacturing. Mill products contain order specific attributes like width, surface finish, length, chemical composition, physical and chemical tolerance limits, and standard product specification (either company specific or more common industry specific). Mill products can be in the form of coils, rolls, bundles etc., and finished mill products are made by operations involving rolling, side trimming, order length cutting, surface treatment etc. Steel, other metals, paper,
7/17/2004

IA-64 Linux From Red Hat
Red Hat announces the availability of the source code for IA-64 platforms, the first of which will be Intel’s “Itanium” processor, due later this year.

G HACKING RESEARCH: source code for the forthcoming Intel Itanium processor platform targeting high-end servers and workstations. This distribution enables the development of IA-64 software for the most intensive computing environments, from high performance design automation to enterprise level databases. A free download version of the code can be obtained from Red Hat s web site: ftp://ftp.redhat.com/pub/redhat/ia64. Red Hat s release of pre-production tools and software represents an important milestone in the
6/15/2000

Be to Be FreeB(i)e
Be Inc. will offer the newest version of its operating system for free later this quarter. Version 5 for the desktop will be available for download to pre-registered individuals.

G HACKING RESEARCH: newest version of its operating system for free later this quarter. Version 5 for the desktop will be available for download to pre-registered individuals. Be will also work with publishers and other partners to distribute the software. Commercial users of BeOS 5 will still require a separate license from Be. The software currently retails for $99. The move is designed to maximize the visibility and acceptance of Be technology, the company said. Making the free version of BeOS 5 available through the
1/26/2000

E-learning Course Design
This article provides hints for the design of e-learning courses with regard to target audience, navigation, objectives, motivation, media, interactivity, assessment, aesthetics, tool selection, and evaluation.

G HACKING RESEARCH: E-learning Course Design E-learning Course Design Don McIntosh, Ph.D - February 23, 2006 Read Comments Introduction Imagine your company is embarking on a program to implement e-learning to complement its classroom training program, and you have been recruited to design some of the new courses. This article lays out a list of questions and hints that can serve as a checklist of things you need to consider when designing e-learning courses. Not all of these points apply to every situation. They must be
2/23/2006

How 3Com, Became 1Com
3Com is getting out of it’s no-growth modem and high-end networking businesses. It’s already spun off the high-growth Palm unit. What will be left?

G HACKING RESEARCH: March 2000 - CNet] Struggling network equipment maker 3Com (NASDAQ:COMS) today announced a broad restructuring plan to resuscitate a networking business that s been plagued by more than a year of stagnant revenue growth. 3Com said it will exit the slow-growing portions of its networking business and focus on emerging technologies, such as wireless networking, Internet telephony, and high-speed Internet access through cable and digital subscriber line (DSL) modems, as previously reported. In a concession
4/7/2000


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others