Featured Documents related to
2012 Business Data Loss Survey results
This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download
Business Data Loss Survey results This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download the full results now.
Linux and Open Source IT Services (Excel Format) RFI/RFP Template
OS and Application Services, Support Services, Consulting, Implementatation, and Reselling, Migration and Version Maintenance Services, Customization Services, Development Services, Security Servic...
Get this template
Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Baan Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid
On February 3, Baan Co. posted a fourth-quarter loss of $236 million, and on February 8, Baan sold its Coda financial applications unit to UK firm Science
Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid Baan Posts $236 Million Loss and Sells Off Coda for Nearly $40M Less Than It Paid P.J. Jakovljevic - February 25th, 2000 Event Summary On February 3, Baan Co. posted a fourth-quarter loss of $236 million, in line with the profit warning that the Dutch business software giant issued last month. The loss compares to a loss of $295 million in the same period of 1998. On a per-share basis, the company lost $1.06, compared to a
Avoid Costly Data Loss and Equipment Failure
Find out about the invisible power supply threats you faceand what you can do about themin this apc white paper: the seven types of power problems.
Costly Data Loss and Equipment Failure There could be an enemy lurking where you don't even suspect it. In fact, there could be up to seven of them —in the electricity that powers your IT equipment. That's because there are seven kinds of power supply problems that can cause data loss or IT equipment failure. Everything from brownouts, to power interruptions, to voltage fluctuations and spikes can result in you losing time, money, equipment, programs, and company data . Shockingly, every year
Stemming the Loss of Knowledge Capital: A Business Fix for Manufacturers
The clock is ticking for manufacturers to come up with a solution to the ongoing loss of knowledge capital. Their best hope lies in introducing knowledge
the Loss of Knowledge Capital: A Business Fix for Manufacturers Manufacturers are in danger of losing significant knowledge capital. Natural employee attrition, such as departures or layoffs, inevitable retirement, and the brain drain are contributing to an exodus of knowledge. Manufacturers should introduce efficient and effective knowledge management strategies across the enterprise before it's too late. By creating a repository of knowledge capital, manufacturers can increase productivity by
After Strong Game, Logility Suffers Fourth Quarter Loss
Despite a strong year in which Logility restored its license revenue, the company expects to close out the fourth quarter of fiscal 2000 with a net loss.
Logility Suffers Fourth Quarter Loss After Strong Game, Logility Suffers Fourth Quarter Loss S. McVey - June 14, 2000 Event Summary Business-to-business collaborative planning software vendor Logility, Inc. reported results for the fourth quarter of fiscal 2000. Total revenues were $6.9 million, a 21% decline compared to total revenue of $7.8 million for the quarter ended January 31, 2000. For the first time in over a year, Logility reported a net loss of $646,000 for the quarter due primarily from lower
Wireless (In)Security Trends in the Enterprise
Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.
WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats. Wireless (In)Security Trends in the Enterprise style= border-width:0px; /> comments powered by Disqus Related Topics: Network Management, Network Monitoring Source: AirTight Networks Learn more about AirTight Network
Strategy Guide to Branch Office Consolidation for Manufacturing
If your company has expanded, or gone through site consolidation, your IT infrastructure may have become a hodgepodge of outdated equipment and inefficient workflows. Employee productivity suffers, risks of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations.
of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations. Strategy Guide to Branch Office Consolidation for Manufacturing style= border-width:0px; /> comments powered by Disqus Related Topics: Electronic Distribution and Storage, Networking, Server, Security Related Keywords: HP, network, server, storage, network
QAD Ends Its Protracted Dry Season, Not Yet On an Easy Street
QAD Inc. reported $0.06 of diluted net income per share, or net income of $2.1 million, on record total revenue of $70.9 million for the fourth fiscal quarter ended January 31, 2000. This compares with $0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999.
$0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999. License revenue was $33.5 million for the fourth quarter-up 62% from the third quarter- compared with $33.0 million in the same period last year. License revenue and development fees from QAD s e-business solutions exceeded $9 million in the fourth quarter. QAD e-business solutions include the QAD eQ suite of Business-to-Business (B2B) applications, with Sell-Side
IBM Tivoli Storage Manager FastBack
Do you need a better backup solution or a better recovery solution? Many businesses are struggling with both an ever-increasing amount of data and a decreasing tolerance to system downtime. You need to reduce the amount of data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss.
data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss. IBM Tivoli Storage Manager FastBack style= border-width:0px; /> comments powered by Disqus Related Topics: Archival and Disaster Recovery Related Industries: Industry Independent Related Keywords: offsite backup software, small business online backup, online backup for small business, online backup
Leveraging Business Growth with Value-based Pricing
Unlike legacy strategies such as cost-plus, historical-based, and volume-driven pricing, which tend to decrease price premiums and profits over time, value-based pricing optimizes pricing structure for current market conditions. It can also accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy.
accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy. Leveraging Business Growth with Value-based Pricing style= border-width:0px; /> comments powered by Disqus Related Topics: Accounting and Financial Management Related Industries: Industry Independent Related Keywords: Value-Based Pricing, Value-Based, bu
Data Privacy: Protecting the Core of your Business
Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.
external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches. Data Privacy: Protecting the Core of your Business style= border-width:0px; /> comments powered by Disqus Related Topics: Database Management System (DBMS), Security Related Industries: Management, Scientific, and Technical Consulting Services, Management of Companies and Enterprises Source: Guardium Learn more about Guardium Readers who
havac l k icin verilere advicing
business area in software
havac l k ve savunma icin verilere advicing
havac l k savunma icin verilere advicing
cache wuci30r1faej vs technologyevaluation com software 46 15423
calculate safety stock excel
havayolu icin verilere advicing
calculating safety stock in excel
hava ta mac l icin verilere advicing
can you a modify an email chain into an excel list
ucak veri advicing
challanges in implementing erp
aviyonik icin verilere advicing
challenge of accounting software
bir d belgelere advicing
challenges in implementation of erp
havac l k icin belgelere advicing
challenges in the construction industry
havac l k ve savunma icin belgelere advicing
chery ipo analysis
choosing application software
havac l k savunma icin belgelere advicing
Software Evaluation Reports
Features and Functions
Interactive Case Studies
TEC Case Studies
White Paper Newsletters