Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
2012 Business Data Loss Survey results
This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download
Business Data Loss Survey results This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download the full results now.
Linux and Open Source IT Services (Excel Format) RFI/RFP Template
OS and Application Services, Support Services, Consulting, Implementatation, and Reselling, Migration and Version Maintenance Services, Customization Services, Development Services, Security Servic...
Get this template
Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Baan Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid
On February 3, Baan Co. posted a fourth-quarter loss of $236 million, and on February 8, Baan sold its Coda financial applications unit to UK firm Science
Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid Baan Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid P.J. Jakovljevic - February 25th, 2000 Event Summary On February 3, Baan Co. posted a fourth-quarter loss of $236 million, in line with the profit warning that the Dutch business software giant issued last month. The loss compares to a loss of $295 million in the same period of 1998. On a per-share basis, the company lost $1.06, compared to a
Avoid Costly Data Loss and Equipment Failure
Find out about the invisible power supply threats you faceand what you can do about themin this apc white paper: the seven types of power problems.
Costly Data Loss and Equipment Failure There could be an enemy lurking where you don't even suspect it. In fact, there could be up to seven of them —in the electricity that powers your IT equipment. That's because there are seven kinds of power supply problems that can cause data loss or IT equipment failure. Everything from brownouts, to power interruptions, to voltage fluctuations and spikes can result in you losing time, money, equipment, programs, and company data . Shockingly, every year
Stemming the Loss of Knowledge Capital: A Business Fix for Manufacturers
The clock is ticking for manufacturers to come up with a solution to the ongoing loss of knowledge capital. Their best hope lies in introducing knowledge
the Loss of Knowledge Capital: A Business Fix for Manufacturers Manufacturers are in danger of losing significant knowledge capital. Natural employee attrition, such as departures or layoffs, inevitable retirement, and the brain drain are contributing to an exodus of knowledge. Manufacturers should introduce efficient and effective knowledge management strategies across the enterprise before it's too late. By creating a repository of knowledge capital, manufacturers can increase productivity by
After Strong Game, Logility Suffers Fourth Quarter Loss
Despite a strong year in which Logility restored its license revenue, the company expects to close out the fourth quarter of fiscal 2000 with a net loss.
Logility Suffers Fourth Quarter Loss After Strong Game, Logility Suffers Fourth Quarter Loss S. McVey - June 14, 2000 Event Summary Business-to-business collaborative planning software vendor Logility, Inc. reported results for the fourth quarter of fiscal 2000. Total revenues were $6.9 million, a 21% decline compared to total revenue of $7.8 million for the quarter ended January 31, 2000. For the first time in over a year, Logility reported a net loss of $646,000 for the quarter due primarily from lower
Wireless (In)Security Trends in the Enterprise
Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.
WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats. Wireless (In)Security Trends in the Enterprise style= border-width:0px; /> comments powered by Disqus Related Topics: Network Management, Network Monitoring Source: AirTight Networks Learn more about AirTight Network
Strategy Guide to Branch Office Consolidation for Manufacturing
If your company has expanded, or gone through site consolidation, your IT infrastructure may have become a hodgepodge of outdated equipment and inefficient workflows. Employee productivity suffers, risks of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations.
of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations. Strategy Guide to Branch Office Consolidation for Manufacturing style= border-width:0px; /> comments powered by Disqus Related Topics: Electronic Distribution and Storage, Networking, Server, Security Related Keywords: HP, network, server, storage, network
QAD Ends Its Protracted Dry Season, Not Yet On an Easy Street
QAD Inc. reported $0.06 of diluted net income per share, or net income of $2.1 million, on record total revenue of $70.9 million for the fourth fiscal quarter ended January 31, 2000. This compares with $0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999.
$0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999. License revenue was $33.5 million for the fourth quarter-up 62% from the third quarter- compared with $33.0 million in the same period last year. License revenue and development fees from QAD s e-business solutions exceeded $9 million in the fourth quarter. QAD e-business solutions include the QAD eQ suite of Business-to-Business (B2B) applications, with Sell-Side
IBM Tivoli Storage Manager FastBack
Do you need a better backup solution or a better recovery solution? Many businesses are struggling with both an ever-increasing amount of data and a decreasing tolerance to system downtime. You need to reduce the amount of data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss.
data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss. IBM Tivoli Storage Manager FastBack style= border-width:0px; /> comments powered by Disqus Related Topics: Archival and Disaster Recovery Related Industries: Industry Independent Related Keywords: offsite backup software, small business online backup, online backup for small business, online backup
Leveraging Business Growth with Value-based Pricing
Unlike legacy strategies such as cost-plus, historical-based, and volume-driven pricing, which tend to decrease price premiums and profits over time, value-based pricing optimizes pricing structure for current market conditions. It can also accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy.
accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy. Leveraging Business Growth with Value-based Pricing style= border-width:0px; /> comments powered by Disqus Related Topics: Accounting and Financial Management Related Industries: Industry Independent Related Keywords: Value-Based Pricing, Value-Based, bu
Data Privacy: Protecting the Core of your Business
Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.
external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches. Data Privacy: Protecting the Core of your Business style= border-width:0px; /> comments powered by Disqus Related Topics: Database Management System (DBMS), Security Related Industries: Management, Scientific, and Technical Consulting Services, Management of Companies and Enterprises Source: Guardium Learn more about Guardium Readers who
identifie des modeles de mots et de phrases a l interieur de texte de
fail over reachemine automatiquement les utilisateurs vers d autres
millions de lignes de traitement avec un temps de reponse inferieur a
boucle fermee de traitement transactionnel
souleve la priorite activite ou element de travail dynamique au moment
l integration des services en ligne
assure l integrite du processus et de la robustesse a travers
definit et gere complexe ou compose travail compose des elements
offre locale des regles specifiques a tous les algorithmes d
arbre modele structure qui organise logiquement les colonnes de base
tableaux croises permettent de rupture d un rapport sur un nombre
parcelle de proximite pour identifier facilement tous les mots cles
server centric l architecture
numerique ou date et heure axe s
s integre aux applications tierces
categorise les mots ou les phrases a l aide existante ou definie par l
pre pour suivre l evolution des donnees et des exceptions
a la demande de table de pagination des matieres
volume eleve de traitement des transactions en ligne
volume eleve de traitement des transactions en ligne
vue de mise en cache
conformite pret a sarbanes oxley
pre construits financiers des relations declaration rapports et d
associations et organismes sans but lucratif
sortes de travaux dans une file d attente au moment de l execution des
Features and Functions
White Paper Newsletters