X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 laptop used


Are Your Company Laptops Truly Secure?
The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and

laptop used  worsen over time as laptop use increases and thieves become more sophisticated in their methods. Organizations that do not have a technique for swift recovery can never truly ensure their clients' confidentiality. Trade secrets and private information are always at risk. Compromised data is most damaging when it falls into the hands of a competitor or is used by individuals wishing to exploit the personal information for financial gain. INCREASING DANGER Increased portability means increased convenience -

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » laptop used

Alice (or Allen) in MobileLand


Cell phones, smartphones, and similar mobile devices are beginning to play an active role in customer relationship management; many of these handheld devices are capable of handling field service and sales, and can make business intelligence available to users.

laptop used   Read More

A How-to Guide for a Radio Frequency Identification Site Survey


As organizations prepare for a radio frequency identification (RFID) implementation, they often don't understand the preliminary work necessary to begin the project. The importance of a site survey can influence the success or failure of an RFID project.

laptop used   Read More

Don’t Forget to Factor In Mobile ERP When Selecting a New ERP System


A 2011 study of mid-market manufacturers sought to understand the nature of demand for mobile access to enterprise resource planning (ERP) and other enterprise software. This study surveyed over 200 executives, all of whom reported involvement in software selection at manufacturing companies with more than $100 million (USD) in revenue. Read this article to learn about the current state of mobile ERP for mid-market manufacturers.

laptop used   Read More

PKI and Biometrics Ready for Take-Off


Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same legal ramifications as documents signed in traditional wet-ink.

laptop used   Read More

Adonis: DNS/DHCP for Small to Medium Sized Business


Small to medium businesses have typically built their own domain name system (DNS) and Dynamic Host Configuration Protocol (DHCP) services, used Windows DNS/DHCP, or turned to a hosted service provider for these services. This approach may appear to offer tremendous savings, but contains many hidden costs and risks that are not always apparent until a catastrophic loss of service occurs.

laptop used   Read More

Customer Relationship Malpractice


Although malpractice is usually a term used in medicine, its definition (“any instance of improper professional conduct”) shows that the term can be used in any profession. In my opinion, malpractice can also be found in customer relationship management (CRM).  It can result in financial damage (lost sales, penalties for not delivering on time, etc.) or loss of confidence, which can jeopardize the

laptop used   Read More

Who Needs Enterprise Asset Management (EAM) Anyway?


What is EAM? As the acronym implies, EAM is used to manage assets in a company, which can be a module in an enterprise resource planning (ERP) solution or a standalone product. EAM is also known as computerized maintenance management system (CMMS), or computerized maintenance management information system (CIMMS), and it is a software package used to plan, control, and monitor assets from

laptop used   Read More

Search Engines Used to Attack Databases


Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.

laptop used   Read More

Hub and Spoke Integration SAP and Microsoft Dynamics NAV


The hub and spoke concept refers to a parent or holding company that uses one business software system (the hub), which is integrated with the systems used by its individual subsidiaries or divisions (the spokes). We look at the hub and spoke concept with SAP R/3 at the hub, and Microsoft Dynamics NAV at the spokes.

laptop used   Read More

Case Study: St. Vincent Heart Center


Until recently, St. Vincent Heart Center used an HTML-based intranet to disseminate various types of information to its 470 employees and 200 contract workers. But information on that system wasn’t easy to find. Microsoft® Office SharePoint® Server 2007 offers the organization easy access to information—and it enhances productivity and supports increased security for confidential information. Read more about the benefits.

laptop used   Read More