X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet disk


Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000

internet disk  Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » internet disk

How to Comply with Data Security Regulations


A remote data backup solution can be compliant with almost any international, federal, or state data protection regulation—and can be compliant with the common caveats of most data security laws by providing functionality like data encryption and secure media control. And, as some regulations require files to be archived for several years, you can create a routine that archives files you select for backup and storage.

internet disk   Read More

Acer to Jump on Internet Appliance Bandwagon


Computer maker Acer is planning to launch a line of Internet appliances at next month's Consumer Electronics Show, in Las Vegas, according to a company source.

internet disk   Read More

The Marriage of Virtual Machines, Software as a Service, and Cloud Computing


New technology, such as virtual machines and high-speed internet communication, is leading to wider remote application hosting. Here is a tutorial-level technical explanation of how it’s being driven

internet disk   Read More

Buyer's Guide to Enterprise Storage Resources


Organizations of all sizes face similar challenges when managing storage—not enough capacity or protection. Help has arrived with Internet small computer system interface storage area networks (iSCSI SANs)—and they're steadily gaining momentum. With iSCSI SANs, businesses can effectively manage their storage needs, while lowering costs and increasing security. Find out why many industry leaders are choosing iSCSI today.

internet disk   Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

internet disk   Read More

Internet Trust Marks: Building Confidence and Profit Online


Learn all about trustmarks, and how they boost online sales in Internet Trust Marks: Building Confidence and Profit Online.

internet disk   Read More

Five Things You Must Know When Selecting an Internet Content Filter


Why install an Internet content filter? Schools can use one to set limits on students’ Internet access. Businesses might want to use a content filter to ensure employees better focus on the task at hand. But unlimited Web surfing also increases the risk of infecting your system with malware. Learn about five factors can help you better understand why you need a content filter, and how to select a content filter solution.

internet disk   Read More

SynQuest Teams With InterWorld for Internet Sales and Fulfillment


SynQuest, Inc. has paired with InterWorld in a joint marketing alliance aimed at manufacturers with extended distribution networks. Their pact reflects a trend among vendors of customer-facing applications and back-end fulfillment products to expand their solutions.

internet disk   Read More

Supply Chain Planning in 2000: The Brains Behind Internet Fulfillment


The supply chain planning market will top $2.5 billion in 2000, driven in large part by the needs of Internet customer fulfillment.

internet disk   Read More

Dell Jumps Into Internet PC Arena


Dell Computer Corp. has announced that it is taking orders for its new Webpc, Dell's first product from its Web Products Group, and its first foray into the growing market of Internet appliances.

internet disk   Read More