X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Outsourcing, IT Infrastructure
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
 

 laptops notebooks


Linux Laptops from Dell
Dell now has begun selling two models of its laptops with Linux preinstalled.

laptops notebooks  Laptops from Dell Event Summary 2/1/2000 [Cnet News] - Dell now has begun selling two models of its laptops with Linux preinstalled. The products, the Latitude CPX and the Inspiron 7500, come with Red Hat Linux 6.1 and are certified by Linuxcare. The Inspirons with Linux are available now, but the Latitudes will be available Feb. 4, according to a company representative. The move has been expected since last August. The CPX is the top-of-the-line model of Dell's Latitude line, slimmer and more

Read More


Discrete Enterprise Resource Planning (Discrete ERP) RFI / RFP Template

Financials, Human Resources, Manufacturing Management, Inventory Management, Purchasing Management, Quality Management, Sales Management, Product Technology Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Outsourcing, IT Infrastructure
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...

Documents related to » laptops notebooks

Are Your Company Laptops Truly Secure?


The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.

laptops notebooks  Your Company Laptops Truly Secure? Compliance. Protection. Recovery. A Layered Approach to Laptop Security If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking&8482; solutions. Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data Read More

IBM to Make Cuts in PC Business Real Change, or Just Buying Time?


International Business Machines Corp. plans to cut as much as 10% of the workforce at its personal computer division, or as many as 1,000 jobs, in a cost-cutting effort to turn around the division that lost nearly $1 billion last year.

laptops notebooks  Aptiva PCs, and ThinkPad notebooks/laptops. IBM's PC business has had difficulties for several years, resulting in the consumer PC division head being replaced last summer. With the consumer PC division now being folded into the business PC division, the waters are muddied further. Market Impact In the extremely competitive PC marketplace, circling the wagons is not a good sign. IBM cannot indefinitely sustain $1 Billion losses, and cutting 1,000 people will make only a modest dent. Most of the Read More

How Do You Categorize Notebooks?


The notebook computer market has become one of the remaining battlegrounds for computer manufacturers. Our purpose here is to define the notebook market segments, describe what the general characteristics of each segment are, and to give users an idea of what features they can expect for each segment.

laptops notebooks  Do You Categorize Notebooks? How Do You Categorize Notebooks? R. Krause - September 25, 2000 Overview The notebook computer market has become one of the remaining battlegrounds for computer manufacturers. The Intel-based server market has consolidated to four major manufacturers (Compaq, Dell, Hewlett-Packard, and IBM). The desktop PC market, although highly competitive, has seen similar consolidation, and the breadth of offerings has narrowed in recent years. The nearest thing to vitality here was the Read More

Transmeta to Intel/AMD: Eat Our Dust


Transmeta’s CEO says his company has a five-year lead on Intel’s and AMD’s technology. Reality or hype? And does it matter?

laptops notebooks  to Intel/AMD: Eat Our Dust Transmeta to Intel/AMD: Eat Our Dust R. Krause - October 4, 2000 Event Summary September 26, 2000 - In a recent interview, Transmeta Corporation CEO David Ditzel boldly stated that his company's technology is at least five years ahead of that of Intel and AMD, the two leading CPU vendors in the PC marketplace. Transmeta's Crusoe CPU was announced in January. Among Crusoe's notable features is its claim of super-low power consumption, resulting in much longer battery Read More

Eset


ESET is a pioneer in the antivirus industry with its award-winning NOD32 technology celebrating its 25th anniversary in 2012. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today's most sophisticated cyber attacks. On a daily basis, we protect millions of users across all types of environments - be it computers, laptops, mobile devices or servers. ESET Endpoint Security and ESET Endpoint Antivirus, in addition to ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber Security (solution for Mac), are trusted by millions of users globally and are among the most highly recommended security solutions in the world.

laptops notebooks  - be it computers, laptops, mobile devices or servers. ESET Endpoint Security and ESET Endpoint Antivirus, in addition to ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber Security (solution for Mac), are trusted by millions of users globally and are among the most highly recommended security solutions in the world. Read More

Gates Previews Pen-Based Computer


Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

laptops notebooks  Previews Pen-Based Computer Gates Previews Pen-Based Computer R. Krause - November 15, 2000 Event Summary November 13, 2000 Microsoft chairman Bill Gates used his keynote speech at Comdex to unveil a proof of concept system Microsoft calls its Tablet PC . The Tablet is a little over two pounds, and expected to be around the size of a legal pad. Gates apparently believes pad/tablet PCs and pen-based computing are the next big thing(s) in the PC hardware arena. The Tablet currently uses the Read More

IBM Express-es Its Candid Desire For SMEs


IBM has recently reenergized its incursion into the mid-market gold rush with a new program carrying the 'Express' brand, which targets companies with less than 1,000 employees with a bundle of hardware, software infrastructure, professional services, and financing. IBM hopes to ride on the mid-market forays of a plethora of its enterprise application partner providers, while also providing some real alternative for Microsoft at the low end of the application market.

laptops notebooks  Express-es Its Candid Desire For SMEs Event Summary The market has recently witnessed a number of high-profile announcements of stalwart vendors' aspirations to capture the lower-end of the enterprise applications space as their response to ever more audible siren song of the opportunity (see Software Giants Make Courting A Small Guy Their 'Business One' Priority ). To that end, even the vendor that is not an application provider per se but that could hardly be omitted in any serious enterprise Read More

How Bar Codes Can Optimize Data Recording and Information Analysis


Bar code technology allows users to analyze information to develop more accurate maintenance, personnel, and financial planning. In particular it can hasten the data recording processes in a maintenance system, as seen in its use in the aircraft maintenance process.

laptops notebooks  enable the use of laptops or personal digital assistants (PDA). Larger or smaller quantities of consumables, such as tapes, toners, tags, etc., will also be required based on the situation and the company's needs. How expensive is the implementation of a bar code system? Generally speaking, the costs related to the implementation of a bar code system are affordable, but it will depend on the design of the solution and the company's specific requirements. A well designed solution will optimize the use of Read More

Dell to Acquire ConvergeNet International


Dell Computer Corporation announced its intent to acquire ConvergeNet, a storage networking company, in a deal valued at approximately $340 Million.

laptops notebooks  hardware integration,hardware migration,hardware migration plan,hardware software,internal migration,migration,migration policy,migration routes,migration software,migration to new hardware,update hardware,dell,ConvergeNet,Intel Read More

Building a Business Case for Enterprise Spyware Protection


It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity.

laptops notebooks  installs on PCs and laptops you may think are protected behind network protections, as well as those used remotely, and then—regardless of the initial point of entry— the adware sends its reports over your network back to its source. You can measure the cost of one small transmission, and the cost of millions of legitimate business transmissions is justifi able. But that same unit cost multiplied for as many, if not more, millions of instances of adware traffi c is wasted money – fat, not lean, Read More

Outsourcing 101 - A Primer Part Two: Outsourcing Categories


Outsourcing is a very diverse market, and there are many different outsourcing options and outsourcing service providers to choose from. This part examines the four broad outsourcing categories: application software, information technology infrastructure, business process outsourcing (BPO), and manufacturing.

laptops notebooks  computers Servers Desktop PCs Laptops Handheld devices Printers Phones Operating systems and desktop software E-mail A company will typically look to outsource its I.T. infrastructure in order to obtain a more predictable cost structure, while receiving a well-supported and highly reliable system, with very high system uptime, and rapid response to problems. The following activities are typically included in the I.T. infrastructure outsourcing arena: Physical facilities setup and maintenance Site Read More

Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication


The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now.

laptops notebooks  The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now. Read More

CRM For Complex Manufacturers Revolves Around Configuration Software


While pundits have been debating whether the configuration software deserves to be a CRM module on its own, it is certainly a part of the much broader CRM class of products, which typically includes front-office applications for sales force automation (SFA), marketing automation, and field service/call center management.

laptops notebooks  desktop computers, or on laptops for sales personnel on the road. While pundits have been debating whether the configuration software deserves to be a CRM module on its own, it is certainly a part of the much broader CRM class of products, which typically includes front-office applications for sales force automation (SFA), marketing automation, and field service/call center management. In general, product configurators are software tools that streamline order entry process by asking the customer to Read More

CRM Buzzwords and Trends for 2009


Customer relationship management (CRM) is more than a technology. It’s a business strategy that aims at identifying customers and their needs and then creating sales and service strategies that are unique to them. Here is a quick look at CRM—from buzzwords to trends, to some recommended solutions.CRM Buzzwords CRM ecosystem - the changing landscape of customer relationship

laptops notebooks  literally connected—through their computers, laptops, pagers, cells phones, SmartPhones, iPhones, or Blackberries. And through forums like MSN Messenger, wikis, podcasts, Facebook, LinkedIn, Classmates, MySpace, Reunion.com, personal blogs—just to name a few. The list is endless . This is what is known as social networking, social computing, or Web 2.0 (in this case CRM 2.0). While social networking is certainly not a new technology, it seems to be gaining momentum. For the über-shopper, new Read More