Home
 > search for

Featured Documents related to » loss



ad
Get Free ERP Systems Comparisons Now

Find the best ERP software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » loss


2012 Business Data Loss Survey results
This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download the full results now.

LOSS: 2012 Business Data Loss Survey results 2012 Business Data Loss Survey results Source: Cibecs Document Type: White Paper Description: This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download the full results now. 2012 Business Data Loss Survey results style= border-width:0px; />   comments powered by Disqus Related Topics:   Business Intelligence and Data Management Related Keywords:   data
5/30/2012 5:47:00 AM

Avoid Costly Data Loss and Equipment Failure
Find out about the invisible power supply threats you faceand what you can do about themin this apc white paper: the seven types of power problems.

LOSS: Avoid Costly Data Loss and Equipment Failure Avoid Costly Data Loss and Equipment Failure There could be an enemy lurking where you don t even suspect it. In fact, there could be up to seven of them —in the electricity that powers your IT equipment. That s because there are seven kinds of power supply problems that can cause data loss or IT equipment failure. Everything from brownouts, to power interruptions, to voltage fluctuations and spikes can result in you losing time, money, equipment, programs,
2/2/2009

Will Intel Take a Loss on Each CPU, but Make It Up in Volume?
There are reports that Dell may buy AMD’s Spitfire chip. If the reports are true, then look for competition to produce lower prices.

LOSS: Will Intel Take a Loss on Each CPU, but Make It Up in Volume? Will Intel Take a Loss on Each CPU, but Make It Up in Volume? R. Krause - April 21, 2000 Read Comments R. Krause - April 21st, 2000 Event Summary Advanced Micro Devices (AMD) may finally be able to break into Dell Computer Corporation s product line, according to sources quoted by Forbes.com. Reports indicate that Dell is negotiating to buy approximately 100,000 of AMD s upcoming Spitfire chip. Spitfire is expected to compete against Intel s
4/21/2000

Aspen Technology Posts First-Quarter Loss but Beats Estimates
CAMBRIDGE, MA Aspen Technology, Inc. (Nasdaq: AZPN), the leading supplier of manufacturing enterprise optimization solutions for the process industries, today announced results for its first quarter ended September 30, 1999. Total revenues for the first quarter of fiscal 2000 increased 13.4% to $53.0 million, from the same period in fiscal 1999. For the three months ended September 30, 1999, software license revenue increased 34.2% to $21.5 million, as compared with the first quarter of fiscal 1999, while services revenue rose to $31.5 million. Net loss for the first quarter totaled $2.7 million or $0.11 per share, as compared with a net

LOSS: Aspen Technology Posts First-Quarter Loss but Beats Estimates Aspen Technology Posts First-Quarter Loss but Beats Estimates Steve McVey - October 26, 1999 Read Comments Aspen Technology Posts First-Quarter Loss but Beats Estimates S. McVey - October 26th, 1999 Event Summary Aspen Technology recently announced a shortfall in earnings for the period ended September 30, 1999, although it exceeded analysts expectations. Total revenues for the company were $53 million, of which $21.5 million were derived from
10/26/1999

Epicor Continues To Bleed
On April 27, Epicor Software Corporation reported its financial results for the first quarter ended March 31, 2000. Net loss for the quarter was $8.9 million or $0.22 per share, compared with a net income for the same period last year of $2.1 million or $0.05 per share.

LOSS: first quarter 1999. Net loss for the quarter was $8.9 million or $0.22 per share, compared with a net income for the same period last year of $2.1 million or $0.05 per share (See Figure 1). Figure 1 The company has continued its aggressive measures to control costs and streamline its operating processes, which is evidenced by a sequential decrease in operating expenses from approximately $52.8 million before charges in the fourth quarter of 1999 to $38.4 million in the first quarter of 2000. The company
6/8/2000

Wireless (In)Security Trends in the Enterprise
Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.

LOSS: WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats. Wireless (In)Security Trends in the Enterprise style= border-width:0px; />   comments powered by Disqus Related Topics:   Network Management,   Network Monitoring Source: AirTight Networks Learn more about AirTight Network
1/19/2010 4:15:00 AM

Strategy Guide to Branch Office Consolidation for Manufacturing
If your company has expanded, or gone through site consolidation, your IT infrastructure may have become a hodgepodge of outdated equipment and inefficient workflows. Employee productivity suffers, risks of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations.

LOSS: of disruption and data loss increase, and IT administrative overhead outstrips budget and staff resources. Discover an approach for harmonizing systems, management, and best practices across all your locations. Strategy Guide to Branch Office Consolidation for Manufacturing style= border-width:0px; />   comments powered by Disqus Related Topics:   Electronic Distribution and Storage,   Networking,   Server,   Security Related Keywords:   HP,   network,   server,   storage,   network
7/9/2010 12:33:00 PM

QAD Ends Its Protracted Dry Season, Not Yet On an Easy Street
QAD Inc. reported $0.06 of diluted net income per share, or net income of $2.1 million, on record total revenue of $70.9 million for the fourth fiscal quarter ended January 31, 2000. This compares with $0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999.

LOSS: $0.16 of diluted net loss per share or a net loss of $4.9 million on total revenue of $65.4 million in the fourth quarter of fiscal 1999. License revenue was $33.5 million for the fourth quarter-up 62% from the third quarter- compared with $33.0 million in the same period last year. License revenue and development fees from QAD s e-business solutions exceeded $9 million in the fourth quarter. QAD e-business solutions include the QAD eQ suite of Business-to-Business (B2B) applications, with Sell-Side
4/11/2000

IBM Tivoli Storage Manager FastBack
Do you need a better backup solution or a better recovery solution? Many businesses are struggling with both an ever-increasing amount of data and a decreasing tolerance to system downtime. You need to reduce the amount of data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss.

LOSS: data at risk of loss and eliminates error-prone manual operations from the data protection process. And you need to get your operations back up within minutes of any type of data loss. IBM Tivoli Storage Manager FastBack style= border-width:0px; />   comments powered by Disqus Related Topics:   Archival and Disaster Recovery Related Industries:   Industry Independent Related Keywords:   offsite backup software,   small business online backup,   online backup for small business,   online backup
5/9/2011 9:53:00 AM

Leveraging Business Growth with Value-based Pricing
Unlike legacy strategies such as cost-plus, historical-based, and volume-driven pricing, which tend to decrease price premiums and profits over time, value-based pricing optimizes pricing structure for current market conditions. It can also accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy.

LOSS: accommodate market changes without loss of profit. Value-based pricing is a strategic tool to be championed by the executive suite and business unit leads. This paper outlines the elements of a successful value-based pricing strategy. Leveraging Business Growth with Value-based Pricing style= border-width:0px; />   comments powered by Disqus Related Topics:   Accounting and Financial Management Related Industries:   Industry Independent Related Keywords:   Value-Based Pricing,   Value-Based,   bu
12/18/2011 11:34:00 PM

Data Privacy: Protecting the Core of your Business
Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.

LOSS: external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches. Data Privacy: Protecting the Core of your Business style= border-width:0px; />   comments powered by Disqus Related Topics:   Database Management System (DBMS),   Security Related Industries:   Management,   Scientific,   and Technical Consulting Services,   Management of Companies and Enterprises Source: Guardium Learn more about Guardium Readers who
3/30/2007 3:56:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others