X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 logs viewer


InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem

logs viewer  to review your firewall's logs on a daily basis. Unfortunately, firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention. Unlike many of the other firewall reporting products on the market, Stonylake Solutions ' InsideOut Firewall Reporter is truly useful. InsideOut reports the same basic type of information as most other firewall reporting

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » logs viewer

PeopleSoft on Client/Server and Database Issues


To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture and database management as they relate to the PeopleSoft Enterprise Resource Planning suite of products.

logs viewer  and password and automatically logs on to all appropriate servers. It is an important feature that the client should investigate with any ERP vendor being considered. The exact method of making the call to the SSO product should be discussed in depth. Question: What is the maximum number of concurrent production users that has been recorded by PeopleSoft? TEC Analysis: Mr. Daniels was unable to answer this question immediately, but according to benchmarks recorded on their web site, PeopleSoft has been Read More

The Challenges of a Business Intelligence Implementation: A Case Study


The University of Illinois provides a good example of extensive integration of its business intelligence (BI) solution and data warehousing environment with its enterprise resource planning (ERP) solution.

logs viewer  and the creation of logs overpowering the system. In terms of service, Business Objects worked closely with the university to create a stable environment with the upgrade to version 6.5.1 . Recommendations and Lessons Learned The challenges of creating a server environment that encourages not just use of the BI tool but that does so based on its strengths are two areas to consider when implementing a BI solution. To develop a stable environment, organizations should overestimate the use of the system. Read More

Fill 'er Up, Check the Battery and Sell Me an iMac


Ten Square will be delivering digital content to a gasoline pump near you. And that’s only the beginning.

logs viewer  Chevron,Amoco,BP,Texaco,Shell,Mobil,Exxon,Dresser Equipment Group,Wayne Division,Marconi Commerce Systems,retail gasoline pumps,Ten Square Read More

CyberPeepers from Korean Sites Peek at U.S. Networks


Numerous United States Internet sites are being bombarded by cyberpeepers from Korea. Whether or not these network scans constitute an attack depends upon whom you ask, and how far into your infrastructure they get.

logs viewer  and review the firewall logs daily. 2. Hire an outside auditing company to see if your organization is vulnerable to security compromises. 3. If it is not feasible to put in an SPI firewall, install an Intrusion Detection System to assist your stateless firewall in data gathering. 4. Hire a security engineer to monitor your organization's network traffic on a daily basis. 5. Don't go overboard trying to figure out where mysterious scans are coming from. It's better to spend the time fortifying your Read More

InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs


The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network.

logs viewer  Mysteries of Your Firewall Logs Executive Summary The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network. Recently we took a look at InsideOut Firewall Reporter (IFR), created by Stonylake Solutions to find out how it interprets data and information produced by a Read More

Who’s That Knocking On Your Web?


Coremetrics’ approach to visitor tracking is a hosted service that incorporates industry best practices to provide profiling of site visitors to support media analysis, merchandizing and segmentation.

logs viewer  that rely on web logs, Coremetrics captures data in real time and can capture views of pages that a user returns to with the browser's Back button. Collected data are placed in a relational database and can be viewed by the customer in a variety of forms that have been developed through best practice analysis of Coremetrics' initial customers. Coremetrics believes that this ensures that new customers will be able to use the information that is collected almost immediately, without any need for Read More

Traffic Audits Make Strange Bedfellows: Part I - The Why’s and What’s of Auditing


Have you heard the one where the Director of Product Marketing, the CIO and the auditor are found together in a small conference room? Couldn’t happen, you say? Au contraire! With traffic being the lifeblood of an e-commerce site the Marketing crew knows that the traffic numbers are going to be audited. And they look to the CIO to make sure that the numbers pass muster. If there’s a problem with the numbers, the CIO may be blamed.

logs viewer  impressions come from the logs of the adserver (see How to Serve an Ad: Better to Buy Than to Build ). The number of clickthroughs can be determined by the advertisers. However, you will need to count these yourself as well, to protect against advertisers claiming rebates because the clickthrough numbers were lower than expected. With all these complex numbers, and thousands of dollars on the line from every advertiser, why should an advertiser trust you to deliver accurate numbers? After all, you were Read More

Implementing Detailed User-level Auditing of UNIX and Linux Systems


UNIX and Linux systems aren’t exempt from the rigors of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance.

logs viewer  of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance. Read More

Business Intelligence


The ability to extract and present information meaningfully is vital for business management. Indeed, business intelligence tools enable companies to make better decisions, by providing the right information to the right people at the right time. Moreover, employees increasingly suffer from information overload, and require solutions that make informed decisions a more natural part of the everyday work experience.

logs viewer  Intelligence Microsoft Dynamics GP Business Intelligence If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Microsoft Dynamics GP enhances business intelligence (BI) capabilities and helps people at all levels of the organization transform data into actionable insight. Source : Microsoft Dynamics BI Software Evaluations & Comparisons Get the best technology match for your company. The online Evaluation tool can save months of resea Read More

Zoho’s Mod Appeal


If you are a small or medium business and you haven’t heard of Zoho yet, you should check it out—the company might have an app for you, perhaps even for free. The name alludes to small office, home office, i.e., SOHO, although some products are suited to larger companies. The Web-based mini apps of the Zoho Office Suite are a great example of the trend of the atomization of user experience

logs viewer  connect via Zoho’s forums, blogs, Facebook pages, and Twitter feeds.  Zoho’s Apps Portfolio Currently, Zoho offers several online office applications, such as Zoho Writer , Zoho Sheet , Zoho Show , and Zoho Mail (comparable to Microsoft Office and Google Apps ), along with CRM, Projects, Invoice, Chat, and Meeting. These applications are offered directly via the Zoho.com site or through hundreds of partners in the Zoho Alliance Partner Program . All apps, with the sole exception of Zoho Books Read More

Food Safety, Government Regulations, and Brand Protection


Many food companies are investing significant funds in building awareness for their brands in the market, which can pay off amply in competitive, commodity markets. One highly publicized recall, however, can turn an established brand asset into a liability.

logs viewer  Safety, Government Regulations, and Brand Protection A 2005 survey of industry professionals by Food Processing Magazine ranked food safety as the number one plant-level concern (see figure). Of those surveyed, 85 percent stated they were taking additional steps to ensure food safety. The ranking of food safety as the primary concern is justified. Outcries against outbreaks of salmonella, Escherichia coli (E. coli), severe acute respiratory syndrome (SARS), bovine spongiform encephalopathy (also known Read More

Reporting Tools


Analysis and reporting services are an important part of the enterprise resource planning process. Microsoft Dynamics NAV has been designed to give users options for optimal analysis and reporting, and to leave room for partners to provide customized solutions. With the correct reporting tools and Microsoft Dynamics NAV, practical analysis and reporting is available and adaptable to individual users’ needs.

logs viewer  This is described at http://blogs.msdn.com/clausba/ (this is not an out-of-the box functionality of the current release ). To be able to use cubes created in Business Analytics Basic in conjunction with Business Scorecard Manager, it makes sense to create Measures that cannot be created directly from Microsoft Dynamics NAV. To do this, it is necessary to use the tools provided with Analysis Services. This is described at: http://blogs.msdn.com/clausba. An example of a measure that makes sense in Read More

Not Yet Sold on SaaS ERP in Manufacturing? Take a Hard Look at Plex Online - Part 2


Part 1 of this blog series explained Plex Systems’ ebullience and growth despite a hostile and depressed environment, especially in the discrete manufacturing sector. While the software-as-a-service (SaaS) model is now mainstream in many functional areas of business, the article concurred with Frank Scavo’s recent assertion that, for the time being, there is only one true SaaS enterprise resource

logs viewer  chain), the distributor simply logs onto the Web portal of the manufacturer’s system and creates a problem report, including the serial number or bar code scan identifying the problem device. The problem ticket then triggers alerts inside the system, immediately notifying Quality & Compliance to investigate. The trouble ticket arrives with a complete traceability tree for the problem device, including all its components. Thereafter, a  root cause analysis (RCA)  will identify the LCD problem, whereby Read More

Finding Your Way Around E-commerce


Breaking into E-commerce can have you going in circles. This document provides an E-Commerce Roadmap to both prepare you for your trip and keep you from bumping into the bigger obstacles.

logs viewer  from the web server logs by an intern, but you'll find that many different departments want different kinds of packaging and details. Traffic reports are their clue to what works and what doesn't, and the faster they can find out about a page that's too boring for people to read, or one that's a grabber, the faster one can make changes that have a direct or indirect effect on revenues. This may be the one piece of web technology that everyone on the business side will use - and scream about when the Read More