X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 gb dss


VA Linux Releases NAS Server
Trying to break into the growing Network-Attached Storage market, Linux-based hardware manufacturer VA Linux has announced the release of its 9205 NAS storage

gb dss  at under $29,300 for 180GB of storage, the VA Linux 9205 is the first in a family of NAS solutions from VA Linux Systems. All VA Linux NAS products feature an extensive service and support package - VA's award-winning Total Linux Coverage (TLC) for NAS - including one year of unlimited 24x7 technical support and onsite service and three years of comprehensive warranty coverage. Market Impact VA Linux is trying to cash in on a confluence of two key trends: the rising popularity of Linux, and the growth

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » gb dss

HP's Four-CPU Wintel-Based Rack Servers: Focusing on Reliability and Expandability


Hewlett-Packard's four-CPU rackmount products, the NetServer LH4r and LXr 8000, are aimed at customers who want reliable, expandable server installations.

gb dss   Read More

Achieving PCI DSS, SOX, and HIPAA Compliance through Comprehensive IBM WebSphere MQ Auditing


The result of implementing middleware products such as WebSphere MQ (WMQ) “out-of-the-box” without security measures has led to increased risk of failed audits on various regulatory measures. The need for auditing, penetration testing, and remediation of critical middleware structures to assure regulatory compliance and provide internal security methods beyond traditional perimeter security methodologies is paramount.

gb dss   Read More

A Definition of Data Warehousing


There is a great deal of confusion over the meaning of data warehousing. Simply defined, a data warehouse is a place for data, whereas data warehousing describes the process of defining, populating, and using a data warehouse. Creating, populating, and querying a data warehouse typically carries an extremely high price tag, but the return on investment can be substantial. Over 95% of the Fortune 1000 have a data warehouse initiative underway in some form.

gb dss   Read More

Connecting Your Executives to the CRM Effort: Becoming (and Remaining) a Data-driven Organization


When businesses commit to implementing customer relationship management (CRM), they commit to realigning their entire organizations around the customer. More specifically, they commit to collecting the right data—and using it the right way at the right time. But if you’re the manager championing CRM in your organization, how do you create the CRM buzz and obtain executive buy-in?

gb dss   Read More

What’s in a Name?


Hewlett-Packard, following a path recently trod by IBM, has decided to maintain a single 'e-PC' product name, eliminating the e-Vectra and e-Brio names.

gb dss   Read More

A Case Study and Tutorial in Using IT Knowledge Based Tools Part 1: Decision Support Discussion


In going through a business decision process for complex technology selections, more and more use is being made of technologically driven processes using Decision support tools and captured knowledge. The use of these systems and the capability to drive a solution from them assumes an ability to accurately express business requirements and business value within these tools. In this article, we explore the marriage of knowledge management and decision support in forming knowledge based selection systems and procedures that can assist in reducing the current appalling record of IT project failures. This is illustrated by the process to select a Personal Digital Assistant (PDA).

gb dss   Read More

Data Masking: Strengthening Data Privacy and Security


Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you.

gb dss   Read More

Security Stocks Burn Rubber


Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

gb dss   Read More

Meet PCI DSS Compliance Requirements for Test Data with Data Masking


Whether you’re working toward your first or your next payment card industry (PCI) data security standard (DSS) audit, you know compliance is measured on a sliding scale. But full compliance can’t be achieved with just one policy or technology. Using data masking, a technology that alters sensitive information while preserving realism, production data can be eliminated from testing and development environments. Learn more.

gb dss   Read More

Pronto Software, ERP Vendor


Pronto Software—Australian vendor of software meeting the needs of a range of vertical industries such as retail and food and beverage—wants to ensure it sustains profitable growth. To find partnerships with value-added resellers (VARs) in North America and in other markets, Pronto relies on Technology Evaluation Centers’ (TEC’s) software industry programs. Learn about the other ways Pronto benefits from using TEC.

gb dss   Read More