X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet based standards


Internet Makes SCP All That It Can Be
The Internet is reshaping the supply chain planning marketplace. Several clear trends have emerged in recent years that capitalize on the possibilities for

internet based standards  That It Can Be Internet Makes SCP All That It Can Be S. McVey - April 26th, 2000 Introduction The Internet is reshaping the enterprise applications market by making possible unprecedented visibility and information sharing between enterprises. Nowhere is this transformation more evident than in the supply chain planning (SCP) software market. The fact is, prior to the Internet, much of what SCP promised was never realized beyond a conceptual level. Supply chains that seamlessly joined customers and

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

ERP for Mill-based and Material Converting Environments Software Evaluation Report

The ERP for Mill-based and Material Converting Environments Software Evaluation Report focuses on a range of industrial activities that add value to raw materials by processing them into a form suitable for further manufacturing or for immediate end-use. These activities include traditional mills that turn grain into flour or extract sucrose from sugar cane; the spinning and weaving mills of the textiles and carpets sectors; the rolling plants of steel, aluminum, and other metals semi-fabricators; to the continuous outputs of paper and board mills. 

Evaluate Now

Documents related to » internet based standards

Ariba Successes Highlight Standards Wars


California based Ariba saw its stock rise 20% (by 17.88 points to 107.88) on August 11, with continued rises into the low 120's for the rest of the week.

internet based standards  is a provider of Internet procurement products and services. The jump followed closely on partnership announcements with vendors in the electronics (NetBuy) and print (Impresse) sectors. It is not necessarily the case that these agreements sparked the price increase, but putting them together provides some insight into Ariba's position and future. Market Impact The Internet Procurement market is still in its infancy. Ariba's product offerings span two of the models for Internet Procurement that are Read More

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

internet based standards  Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from Read More

How to Evaluate Web-based BI Solutions


Web-based business intelligence (BI) is no longer an anomaly: organizations are ready for BI solutions that go beyond Web portals. However, when selecting Web-based BI applications, organizations must evaluate architecture, rather than features or functions. What differentiators do you need to look for before embarking on a full-scale BI implementation? And which vendors offer the solution your organization truly needs?

internet based standards  enabling access from the Internet without having to access an Intranet or internal network. Reporting and analysis In many cases, reporting and analysis represents the bulk of BI tools that are used by organizations. Organizations require the flexibility to analyze data in multiple ways, to change reporting parameters, to update data in real time to help drive business decisions, and to manage reports based on user responsibility and collaboration among teams. Reporting and analysis includes both Read More

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

internet based standards  execution of Java Servlet Internet applications, and the SSL module. We selected this configuration for various reasons. Due to the requirement that the system must work 24 hours a day, 7 days a week, we selected a reliable UNIX-based operating system. Furthermore, 57% of all web servers in the world are Apache, while an additional 3% are Apache derivatives. Also existing third party software for transaction authorization (BankWorks by RS2 Software Group) runs on a Windows NT platform. All software Read More

Five Things You Must Know When Selecting an Internet Content Filter


Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution.

internet based standards  Know When Selecting an Internet Content Filter Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution. Read More

Monitoring and Managing Voice over Internet Protocol (VoIP)


As with most new technologies, voice over Internet protocol (VoIP) brings new challenges along with benefits. The main challenge is VoIP’s extreme sensitivity to delay and packet loss compared with other network applications. However, a basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help you keep your VoIP network running smoothly.

internet based standards  and Managing Voice over Internet Protocol (VoIP) As with most new technologies, voice over Internet protocol (VoIP) brings new challenges along with benefits. The main challenge is VoIP’s extreme sensitivity to delay and packet loss compared with other network applications. However, a basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help you keep your VoIP network running smoothly. 0 Read More

Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper


Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming obstacles—and cash drains. However, enforced identity-based policies within identity-blind systems have proven futile. Is there a solution? Yes. Make your policy enforcement layer identity-aware—build user identity knowledge directly into your network fabric.

internet based standards   Read More

Metadata Standards in the Marketplace - Why Do I Care? (And Where Does Godzilla Fit In?)


Metadata (“data about data”) is essential for data warehousing. Metadata standards allow different products to interact. Without standards, different vendors’ tools cannot work together seamlessly and the customer’s warehousing effort is greatly complicated.

internet based standards  used in cooperation. IIOP: Internet Inter-ORB Protocol. The CORBA messaging protocol used on a TCP/IP network. It allows programs (objects) to be run remotely in a network. IIOP links TCP/IP to CORBA's General Inter-ORB protocol (GIOP), which specifies how CORBA's Object Request Brokers (ORBs) communicate with each other. When a user accesses a Web page that uses a CORBA object, a small Java applet is downloaded into the web browser, which invokes the ORB to pass data to the object, execute the object Read More

Security and Trust: The Backbone of Doing Business over the Internet


Gaining the trust of online customers is vital for the success of any company with an online presence, particularly those that require sensitive data to be transmitted. This VeriSign white paper explores the latest developments in website security that online businesses should consider to build consumer confidence, protect their valuable brand, safeguard sensitive information, and increase transactions.

internet based standards  Doing Business over the Internet Gaining the trust of online customers is vital for the success of any company with an online presence, particularly those that require sensitive data to be transmitted. This VeriSign white paper explores the latest developments in website security that online businesses should consider to build consumer confidence, protect their valuable brand, safeguard sensitive information, and increase transactions. Read More

Secure Transfers of Large Files Over the Internet Using YouSendIt


A growing problem with rich multimedia electronic presentations is their increasing file size. Data files, in general, are larger, making it challenging to send them over the Internet. Most e-mail clients have limitations on attachment sizes, thus securely sending a one hundred megabyte PowerPoint presentation with embedded video over e-mail is nearly impossible. YouSendIt, however, offers solutions consisting of a free web service and the YouSendIt Enterprise Server. Both solutions offer comprehensive security options. The YouSendIt Enterprise Server is an enterprise level, complete large file transfer consisting of a dedicated server that can integrate with existing network security infrastructure.

internet based standards  Large Files Over the Internet Using YouSendIt Introduction Does the following situation sound familiar to you? You have to send a large PowerPoint presentation document to an overseas customer, and the customer's e-mail system will not accept large file attachments. Your customers need the file as soon as possible. You try different options, different e-mail clients, sending a CD by post, or even setting up your own FTP server. If security isn't your biggest concern, setting up the FTP server is Read More

Stopping Image-based Spam


Images have long been part of e-mail communications—from corporate logos in signatures, to scanned documents, and more. But recently, spammers have started using a variety of techniques to embed unsolicited messages into images in order to bypass increasingly sophisticated spam filters used by companies and Internet service providers. The question is, what are you going to do about it?

internet based standards  used by companies and Internet service providers. The question is, what are you going to do about it? Read More

Protect Yourself Against "Converged" Internet Threats


Find out how to protect yourself in the symantec white paper converged threats on the security landscape.

internet based standards  Yourself Against Converged Internet Threats Think you have your Internet security under control? Here are some sobering statistics from last year: Web threats were up 55 percent ; 2,290 malicious sites were blocked per day; 1 in 143 e-mail messages contained malware; and 1 in 200 URLs in instant messages pointed to a malicious site. The question is: are you protected against these threats—individually, and in combination? Converged threats are a dangerous new combination of viruses, spyware, Read More

The Current Landscape of Internet Recruiting


Internet recruiting is a potentially powerful opportunity to augment existing recruitment practices. While the landscape is still dotted with a handful of household names, newer tools and technology will usher in newer entrants. Thus, the organizations willing to experiment and embrace this new technology will eventually win the race to the best talent on the Net.

internet based standards  Current Landscape of Internet Recruiting Internet recruiting is a potentially powerful opportunity to augment existing recruitment practices. While the landscape is still dotted with a handful of household names, newer tools and technology will usher in newer entrants. Thus, the organizations willing to experiment and embrace this new technology will eventually win the race to the best talent on the Net. Read More

Andersen Consulting to Grab a Piece of the Internet Pie


Andersen Consulting has announced plans to deploy $1 billion of its privately-held wealth for the purpose of providing venture capital to Internet start-ups.

internet based standards  a Piece of the Internet Pie Andersen Consulting to Grab a Piece of the Internet Pie S. McVey - December 15th, 1999 Event Summary Andersen Consulting recently announced plans to deploy $1 billion of its privately-held capital to foster growth in web start-ups and new technology companies. Up to half of the stake will be in cash and half in access to intellectual property. The new venture will operate from Silicon Valley, home of Andersen's research facility in Palo Alto, CSTaR (Center for Strategic Read More