X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 laptops


Linux Laptops from Dell
Dell now has begun selling two models of its laptops with Linux preinstalled.

laptops  Laptops from Dell Event Summary 2/1/2000 [Cnet News] - Dell now has begun selling two models of its laptops with Linux preinstalled. The products, the Latitude CPX and the Inspiron 7500, come with Red Hat Linux 6.1 and are certified by Linuxcare. The Inspirons with Linux are available now, but the Latitudes will be available Feb. 4, according to a company representative. The move has been expected since last August. The CPX is the top-of-the-line model of Dell's Latitude line, slimmer and more expensi

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, IT Infrastructure

The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical types of activities that these providers perform include data center operations; network operations; backup/recovery services, data storage management services; system administration services; end user support of desktop PCs, laptops, and handheld devices; web site, or application hosting, etc.  

Evaluate Now

Documents related to » laptops

How to Maximize the ROI from Your Company’s Laptops


Employees with laptops can do their jobs anytime, anywhere. They are empowered to respond to customers, partners, and colleagues faster and more effectively. Sales, service, marketing, and logistics improve... but if your company’s technical support strategy isn’t up to scratch, these gains can be quickly erased by hidden costs—or overturned by critical security risks.

laptops  ROI from Your Company’s Laptops Employees with laptops can do their jobs anytime, anywhere. They are empowered to respond to customers, partners, and colleagues faster and more effectively. Sales, service, marketing, and logistics improve... but if your company’s technical support strategy isn’t up to scratch, these gains can be quickly erased by hidden costs—or overturned by critical security risks. Read More

Protect Your Laptops Against Careless Employee Use


Find out more about endpoint security solutions and laptop security in general, in the white paper protect your laptops against careless employee u...

laptops  Your Laptops Against Careless Employee Use Laptop theft and data breaches are on the rise. But did you know that your company's laptops can be protected even if your employees are careless or negligent? It's true—an endpoint security solution can protect the integrity of information in laptops without requiring the involvement of the laptop user. The laptop is set to protect itself , and it allows for sensitive data to be deleted remotely. What's more, the system can even help recover laptops Read More

Financial IT Reg Enforcement Service: Using FFIEC Security Best Practices to Ensure Laptops and PCs are Secure and Compliant


Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance.

laptops  Best Practices to Ensure Laptops and PCs are Secure and Compliant Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance. Read More

Are Your Laptops Protected against Careless Employee Use?


The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets off the local area network (LAN), remotely deleting sensitive data, and physically recovering stolen computers.

laptops  Your Laptops Protected against Careless Employee Use? Endpoint Security: Data Protection for IT, Freedom for Laptop Users If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking&8482; solutions. Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory Read More

Desktop Management's Dirty Little Secret


ESD (electronic software distribution) promises to simplify software distribution and management, and eliminate ''sneakernet'' the costly, time-consuming manual process that some companies still use to do upgrades and installations. Unfortunately, the cure often has some of the same pitfalls as the problem, not to mention a few snags of its own.

laptops  quarter of its desktops, laptops and Microsoft servers (2,500 PCs) with a new OS and installing or re-installing 50 applications might spend $100 per PC, or a total of $250,000 for the migration. This cost includes planning, writing and debugging scripts (the specific commands that tell the deployment software what to do), and correcting installation problems. These time and labor costs often aren t revealed in the ROI figures ESD vendors show prospective customers. ESD technology evolved to troubleshoot Read More

Mobile Supply Chain Management: The Dream Is Becoming a Reality


Mobile computing is changing the way companies manage their entire business. The development of ultra-portable computing devices is geared to support a slew of mobile solutions to help you run your business on the fly. Read on to find out how modern computing devices can support the expansion of a range of mobile solutions for supply chain management (SCM) and how the cloud will help your business achieve total portability.

laptops  is the reason why laptops still reign supreme in the business world today—it’s your office folded in two, with no compromise. However, with the release of the iPad by Apple last year, a hardware revolution with tablet computers has begun, opening up a new horizon for supply chain management (SCM) systems for businesses. In this article, I will first discuss hardware for mobile solutions, as the latter are designed with the supporting hardware in mind. I will then show you how hardware can support Read More

Employee Training in a Recession


Organizations reassessing their staffing levels are both reducing headcount and cutting employee-related expenses, even if training can provide long-term benefits. This article discusses the increased importance, benefits, and risks of employee training in a recession with respect to enterprise systems.

laptops  necessarily need to bring laptops with the applications already on them. Private classes are very different than public ones, both in terms of costs and content. For one, it s not uncommon for a vendor to charge upwards of $3,000 or more per day for a customized class at the client s site, because vendors know that client end users will not have to incur travel costs. Thus, from a strict cost standpoint, a private class with more than six people will probably be cost-effective for the organization. As Read More

Should It Be Renamed 'Unobtainium'?


Reports indicate that Intel will delay the release of its 64-bit 'Itanium' processor yet again.

laptops   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

laptops  configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization s network before the bad guys do. Read More

CRM Buzzwords and Trends for 2009


Customer relationship management (CRM) is more than a technology. It’s a business strategy that aims at identifying customers and their needs and then creating sales and service strategies that are unique to them. Here is a quick look at CRM—from buzzwords to trends, to some recommended solutions.CRM Buzzwords CRM ecosystem - the changing landscape of customer relationship

laptops  literally connected—through their computers, laptops, pagers, cells phones, SmartPhones, iPhones, or Blackberries. And through forums like MSN Messenger, wikis, podcasts, Facebook, LinkedIn, Classmates, MySpace, Reunion.com, personal blogs—just to name a few. The list is endless . This is what is known as social networking, social computing, or Web 2.0 (in this case CRM 2.0). While social networking is certainly not a new technology, it seems to be gaining momentum. For the über-shopper, new Read More