Featured Documents related to
Case Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops
Learn how IT asset tracking tools helped Allina Hospitals and Clinics monitor 2,700 computers on and off their network without having to invest in additional
hard-drive reformats, replacements and re-imaging. Thefts Continued at Allina Facilities Thefts continued however. In one particularly noteworthy incident, a thief entered an Allina facility one Saturday morning and made off with a laptop. The following day, Allina's IT team watched via the Online Customer Center as the computer went online in nearby Golden Valley. Shortly thereafter, it shut down again. On Tuesday, Allina staff and Absolute Theft Recovery Officers were shocked to see the laptop calling
Discrete Enterprise Resource Planning (Discrete ERP) RFI / RFP Template
Financials, Human Resources, Manufacturing Management, Inventory Management, Purchasing Management, Quality Management, Sales Management, Product Technology
Get this template
Help Desk for the Health Care Industry
Help Desk is an application for assisting and managing calls for support from computer users. It also includes computer and software inventory tracking along with technical support knowledge bas...
Start evaluating software now
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Information Today, Inc.
Information Today, Inc. (ITI) publishes magazines, periodicals, books, and directories. ITI organizes Computers in Libraries, Streaming Media, Enterprise Search
Today, Inc. (ITI) publishes magazines, periodicals, books, and directories. ITI organizes Computers in Libraries, Streaming Media, Enterprise Search Summit, and other conferences.
How to Overcome the Limits of Enterprise Software
Is your enterprise software really making you more competitive? After all, for years you’ve had to make expensive trade-offs between application dependability
servers, and orders of magnitude higher than for applications deployed on commodity hardware. Moreover, specialized hardware and the associated proprietary operating systems typically require esoteric skills for application development and maintenance, driving up operating costs over the long-term. Finally, this approach does not lend itself to agility-organizations building applications based on big iron are typically forced to project needs far into the future and face massive re-architecture should
Intel Throws its
Red Hat said that Intel plans to make Red Hat Linux software available on powerful server computers designed to run websites.
Throws its Red Hat into Linux Ring Event Summary 10/26/99 - Red Hat said on Tuesday that Intel plans to make Red Hat Linux software available on powerful server computers designed to run websites. Red Hat said Intel plans to bundle the Red Hat Linux operating system on servers Intel is supplying to ISPs 1 . Intel has launched a program aimed at boosting its share of the server market, which has been dominated by Sun Microsystems, whose computers use Sun's own chips instead of Intel's. Market Impact
The Case of the Fake Transatlantic Flight: Can You Really Trust Online Tools?
Whether we realize it or not, we all have become more or less dependent on computers, the Internet, and many different and complex computer systems.In both
Oracle Further Orchestrates Its SOA Forays Part Two: Strategy
Oracle's vision of a complete collaborative e-Business solution requires a database strategy, an application server strategy, and an e-business strategy. Will
Further Orchestrates Its SOA Forays Part Two: Strategy Database Strategy In light of Oracle Corporation 's (NASDAQ: ORCL) recent acquisition of PeopleSoft and its growing appetite for the competition, its easy to see how one might underestimate Oracle's internally-developed, product strategy. However, this California-based (US) company has heeded the calls of its customers and the market by beginning a product strategy that focuses on open and flexible business processes. Ease of integration, the
Vendor Analysis: Kaspersky Anti-Virus Products Examined
Kaspersky Labs is no newcomer to anti-virus products. Headquartered in Moscow, Russia, with offices in Pleasanton, California and Cambridge, England, Kaspersky
boot sectors. Figure 2. Image of Kaspersky's Anti-Virus Lite Graphical User Interface Kaspersky's engineered the first anti-virus product in the world for a comprehensive protection of UNIX and Linux systems, and their product line currently offers anti-virus products for the following platforms: Red Hat Linux S.u.S.E. Linux Linux-Mandrake Debian GNU/Linux Slackware Linux ASP Linux FreeBSD BSDi OpenBSD Solaris Clearly Kaspersky is a leader in detecting viruses for UNIX and Linux operating systems and
Pacifica Research is a software publishing company is based in Southern California, and offers a line of real time accounting solutions that serve large and
Research Pacifica Research is a software publishing company is based in Southern California, and offers a line of real time accounting solutions that serve large and small businesses in the areas of payroll, inventory control, accounts receivable, and accounts payable. While accounting serves as the foundation for systems designed by Pacifica, their software packages address the needs of several industries including seed inventory control, corporate inventory control, pesticide use management,
My System Is Trying to Communicate With Me! What Do I Do?
What you should not do is ignore whatever you see on the screen. If you don’t trust computers, remember that they were created and programmed by humans like you
and then open any image editor and paste the results (CTRL + v). For those of you who are capable of fixing such problems on your own, some database providers share their error codes with you, including the possible cause and the action that you can take. Oracle has thousands of error messages, and you can find them all here . For Microsoft SQL Server, go here , type the error number, and see if it helps. “Miracle” solutions like closing the system and opening it again, as well as rebooting your
Defending Your Network from E-mail-borne Botnet Threats
Botnets, networks of hacked computers (bots) that are controlled from a central computer, are rapidly increasing in size and complexity to render legacy e-mail
Your Network from E-mail-borne Botnet Threats Botnets, networks of hacked computers (bots) that are controlled from a central computer, are rapidly increasing in size and complexity to render legacy e-mail security solutions obsolete. Current reactive methods for e-mail security are insufficient, and more proactive strategies are needed. Defend your network with a new anti-botnet solution that helps prevent unwanted e-mail traffic. Find out more.
How Green Is Your Technology Landscape?
Introducing “Green” to ProjectsThere is a growing trend in IT organizations to reduce the environmental footprints that are typically generated from large
Green Is Your Technology Landscape? Introducing “Green” to Projects There is a growing trend in IT organizations to reduce the environmental footprints that are typically generated from large enterprise IT project initiatives. To achieve this goal, a group of prominent IT organizations (HP, Dell, Microsoft, IBM, and others) has merged under the banner The Green Grid to promote energy efficiency in data centers and business computing ecosystems. The Green Grid’s focus is on three key areas: 1.
Case Study: Achieving a 99.7% Guaranteed IT Asset Tracking Rate
Learn how Grant Thornton achieved a 99.7% guaranteed IT asset tracking rate across a nation-wide network of leased computers to tightly control network
despite their condition. Although damaged machines were covered under a no fault warranty, they nevertheless maintained residual value since spare parts can be recycled and reused. It was also necessary to ensure that machines were cleanly wiped of data prior to being retired. It soon became evident that effective asset management required more than simply reporting what was on a given PC ' it was necessary to know where the asset was and who was using it. The solution also required the ability to easily
Active Escrow: The Technical Verification of Software Source Code
The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source
Escrow: The Technical Verification of Software Source Code The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source code—in other words, the object code that can only be read and executed by the computers concerned. That’s why professional escrow is becoming an essential component of operational risk management.
How to Defend Against New Botnet Attacks
In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against@and
to potential litigation and damage brand reputation, are evolving toward a more complex, highly undetectable, and highly dispersed set of structures. The evolution of botnets and the increasing threats they represent for business requires an effective approach to the detection of and protection against the harm they can inflict. In this document, we will define what botnets are, examine the consequences and changes in botnets since the McColo Corporation shut down, present the future state of botnets,
IBM’s NetVista Joins the Appliance PC Fray
IBM debuts an extremely competitive business network appliance with its new NetVista PCs. Now if it can just fix that direct Web site...
NetVista Joins the Appliance PC Fray IBM’s NetVista Joins the Appliance PC Fray C. McNulty - May 24, 2000 Event Summary IBM [NYSE:IBM] announced the availability of its new NetVista all-in-one and legacy-free computers, two new devices designed to simplify the computing experience. Fewer cables and smaller sizes make them easier to carry and set up. New drives, keyboards and Access IBM buttons make them easier to use. New networking and security features make them easier to do e-business. With
encryption and authentication
opening and closing
other types of printing
University and Student Programs
Meet TEC's Experts
Software Evaluation Reports
Features and Functions
Interactive Case Studies
News and Press Releases
TEC Case Studies
Working at TEC
White Paper Newsletters