X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 internet single sign on


Smart Enterprise Single Sign-on (ESSO)
The increasing number of passwords actually decrease productivity and present a security risk when people get frustrated and write their passwords on a sticky

internet single sign on  Introducing Single Sign-on | Internet Single Sign On | Internet Security | Information Security | Implementing Single Sign On | Implementation of Single Sign-on | Identity Management Systems | Identity Management Services | Identity Access Management | How to Single Sign on | Hardware Authentication | Free Single Sign On | Form Authentication | File Encryption Program | ESSO Security Token | ESSO Security Smart Card | ESSO Security Password | ESSO Security Access Control | ESSO Security | ESSO Secure

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Software Test Tools

Tools exist to support software testing at all stages of a project. Some vendors offer an integrated suite that will support testing and development throughout a project's life, from gathering requirements to supporting the live system. Some vendors concentrate on a single part of that life cycle. The software test tools knowledge base provides functional criteria you might expect from a testing tool, the infrastructure that supports the tool, and an idea of the market position of the vendor.  

Start Now

Documents related to » internet single sign on

Legacy Single Sign-On: Novell, Evidian, IBM, PassGo, or Computer Associates?


As the complexity of enterprise systems increases, users are often forced to remember more and more passwords. As the demand on users increases, many users choose to write down their passwords, and by doing so, jeopardize security.

internet single sign on   Read More

The Art Of Distributed Development Of Multi-Lingual Three-Tier Internet Applications


In this article we describe author's experience with the distributed development of multi-lingual three-tier Java/ CORBA/database Internet applications. We believe that the described tips and tricks of trade may be of great use to readers who are involved with Java applications development.

internet single sign on   Read More

Employee Web Use and Misuse: Companies, Their Employees, and the Internet


The Internet creates new opportunities for mischief—and new challenges for managers. How do you balance individual access with the overall good of the business? What’s the right balance between monitoring and blocking? Learn about a Web security solution that can allow you to monitor and enforce your Internet usage policies, bringing site monitoring and filtering together with anti-virus and anti-spyware protection.

internet single sign on   Read More

Application Single-Sign On: Netegrity, Securant, or Evidian?


As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before.

internet single sign on   Read More

SAP Business Suite on HANA: See What You’re Missing


TEC senior ERP analyst Ted Rohm takes a close look at SAP Business Suite on HANA one year after its debut. His report delves into the improvements SAP has been able to achieve by taking advantage of the HANA platform, and explores why SAP ERP powered by HANA is picking up so much momentum.

internet single sign on   Read More

Solace: The Only Complete Messaging Solution for Single Dealer Platforms


Three kinds of messaging need to be supported in Single Dealer Platforms (SDPs) in investment banking: real-time for quote distribution, persistent for order flow, and streaming over the web to rich internet applications. It has historically taken three separate messaging products to meet these needs, but the implementation and integration of these systems introduces many challenges, including the complexity and fragility of the system and scalability issues. This white paper shows how an integrated messaging platform that handles all of the messaging requirements for SDPs reduces these challenges while increasing flexibility and robustness.

internet single sign on   Read More

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

internet single sign on   Read More

Telco Charged with Trickery on Technology


Bell Atlantic is charged with failing to fulfill promises to bring DSL and other high-speed Internet access to the home.

internet single sign on   Read More

War Looms in the On-demand CRM Market (and Beyond)-But Will You Profit from It?


Salesforce.com is now an almost unstoppable force in the world of on-demand customer relationship management. However, it may be the architect of its own downfall—and Microsoft is poised to take advantage. But will you profit from the Salesforce.com-versus-Microsoft war?

internet single sign on   Read More

NAPM Puts The Spotlight On Change


TEC VP, James F. Dowling is quoted in the National Association of Purchasing Management (NAPM) magazine Purchasing Today on the meaning of “Value”. The quote was in the context of how the understanding of the meanings of words change over time.

internet single sign on   Read More