X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet disk


Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000

internet disk  Fighting Cybercrime on the Internet L. Taylor - July 18, 2000 Introduction This note is based on a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center. Note : Portions of this note are excerpted from the presentation, other parts are explanatory text to relate this information to the Technology community serviced by the TEC web site. Information that was not taken directly from

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » internet disk

How to Comply with Data Security Regulations


A remote data backup solution can be compliant with almost any international, federal, or state data protection regulation—and can be compliant with the common caveats of most data security laws by providing functionality like data encryption and secure media control. And, as some regulations require files to be archived for several years, you can create a routine that archives files you select for backup and storage.

internet disk   Read More

Acer to Jump on Internet Appliance Bandwagon


Computer maker Acer is planning to launch a line of Internet appliances at next month's Consumer Electronics Show, in Las Vegas, according to a company source.

internet disk   Read More

The Marriage of Virtual Machines, Software as a Service, and Cloud Computing


New technology, such as virtual machines and high-speed internet communication, is leading to wider remote application hosting. Here is a tutorial-level technical explanation of how it’s being driven

internet disk   Read More

External Drive Backup Warning


Backing up critical data on an external drive provides only minimal protection against one type of data loss: hard drive failure and nothing else. External drives are easily damaged, lost, or stolen. Portable drive backups are rarely taken off-site and are insecure, time-consuming, and limited. And when an external drive holding key data no longer works, what will you do? There’s a better way to back up data. Learn more.

internet disk   Read More

Internet Trust Marks: Building Confidence and Profit Online


Learn all about trustmarks, and how they boost online sales in Internet Trust Marks: Building Confidence and Profit Online.

internet disk   Read More

PhoneFish.com to Offer E-mail for Wireless Access Phones


PhoneFish is a two-way wireless Internet solution for small to medium sized businesses, which require consistent wireless access to POP-based email.

internet disk   Read More

Retail Retold: How the Internet of Things Is Evolving Omnichannel Retail


Most merchants and consumers have adjusted to the multi-device, multichannel environment known as omnichannel retailing. But there are real challenges that the omnichannel environment brings to the retail industry, even before considering how the Internet of Things (IoT) will amplify the complexity. P.J. Jakovljevic and Raluca Druta report on how the IoT is altering the retail world.

internet disk   Read More

Application Access over the Internet: Cloud Computing Service for Higher Education


Wipro completed a research project to understand how application and desktop virtualization technology can be best harnessed for the needs of higher education and compare traditional systems integration implementation approach with a cloud computing model. The team conducted in-depth interviews with a set of colleges and universities that have considered, piloted, or already deployed such solutions. This document is a summary of the research findings and conclusions.

internet disk   Read More

Web-enabled Applications and the Internet: Satisfying the Growing Expectations of Business Users


Businesses today are increasingly committed to Web-enabled applications as a cost-effective way of delivering critical business solutions. But as more and more businesses follow suit, it becomes increasingly apparent that better performance and availability across the Internet must be realized by the early movers in order to maintain their lead. With the deployment of advanced products and services, this can be achieved.

internet disk   Read More

Business VoIP Buyer’s Guide


Voice over internet protocol (VoIP) is a business phone system that allows you to make phone calls using a broadband Internet connection. Once you install VoIP, your employees can call anywhere, whether the receiver has VoIP or not. VoIP can be a cheaper alternative to a traditional phone system, as well as offering additional features. Discover the features of VoIP, and learn how to go about purchasing a VoIP system.

internet disk   Read More