Home
 > search for

Featured Documents related to » online computer hardware stores



ad
Get Free HR Systems Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » online computer hardware stores


What’s Up with Computer Associates?
In a series of radical moves, Computer Associates appears to be trying to re-direct its gargantuan operations. After missing its numbers in the first calendar quarter (CA’s 4th fiscal quarter), its stock was down 59% at one point.

ONLINE COMPUTER HARDWARE STORES: What’s Up with Computer Associates? What’s Up with Computer Associates? M. Reed - October 24, 2000 Read Comments M. Reed - October 24, 2000 Event Summary In a series of radical moves, Computer Associates (NYSE: CA) appears to be trying to re-direct its gargantuan operations (it is the third largest software firm in the United States, behind Microsoft and Oracle). After missing its numbers in the first calendar quarter (CA s 4th fiscal quarter), its stock was down 59% at one point. Here is a partial
10/24/2000

Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has previously failed to make inroads in the consulting arena, and they feel e-business is the way to fix the problem.

ONLINE COMPUTER HARDWARE STORES: Computer Associates Goes E-Business in a Big Way Computer Associates Goes E-Business in a Big Way M. Reed - April 27, 2000 Read Comments M. Reed - April 27th, 2000 Event Summary Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. In addition to product integration with the Jasmine ii product, the acquisition of Sterling Software, and the reorganization of their service and sales staffs, they are focusing on
4/27/2000

Should US Companies Buy Made in USA Software and Hardware? » The TEC Blog


ONLINE COMPUTER HARDWARE STORES: Made in USA, outsourcing, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
23-10-2008

Netpliance Responds Quickly to Hardware Hack
Off to a rough and tumble start, Netpliance's stock fell 18% by its third day of trading due to a security exploit. However, don't expect the rough start to thwart sales. Though the

ONLINE COMPUTER HARDWARE STORES: Netpliance Responds Quickly to Hardware Hack Netpliance Responds Quickly to Hardware Hack L. Taylor - May 9, 2000 Read Comments L. Taylor - May 9, 2000 Event Summary Netpliance s stock took an 18% dip after a slot machine engineer in Las Vegas hacked a procedure to turn the network device into a full-fledged PC. Netpliance, Inc., (Nasdaq: NPLI) which only went public on March 17 at a price of $18.00 a share, was down to $14.00 a share by market close on March 21. The Netpliance, which retails for $99.00,
5/9/2000

High Tech Computer Manufacturer On-Boards Global Supply Chain Partners, Increases Visibility and Coordinates Inbound Execution
When a global high tech manufacturer of desktop and portable PCs sought to reduce their inbound supply chain lead-time and costs, they came to Optum for help improving their visibility to, and coordination with, inbound suppliers, and contract manufacturers. Learn how it integrated partners and its system into the supply chain to achieve its competitive advantage.

ONLINE COMPUTER HARDWARE STORES: High Tech Computer Manufacturer On-Boards Global Supply Chain Partners, Increases Visibility and Coordinates Inbound Execution High Tech Computer Manufacturer On-Boards Global Supply Chain Partners, Increases Visibility and Coordinates Inbound Execution Source: Click Commerce Document Type: White Paper Description: When a global high tech manufacturer of desktop and portable PCs sought to reduce their inbound supply chain lead-time and costs, they came to Optum for help improving their visibility to, and
4/29/2005 9:33:00 AM

Developing a Company-wide Talent Management System to Track and Analyze the Progress of Online Learning
The South African retail bank Capitec needed to comply with new legislation on lending policies and track learning activities across bank branches, etc. So, Capitec, with SumTotal® partner LR Learning Solutions, launched a companywide talent management program dubbed “e-village” based on the SumTotal Learning Management solution that delivers, tracks, and analyzes the progress of online learning. Read about the benefits.

ONLINE COMPUTER HARDWARE STORES: Analyze the Progress of Online Learning Developing a Company-wide Talent Management System to Track and Analyze the Progress of Online Learning Source: SumTotal Systems Document Type: Case Study Description: The South African retail bank Capitec needed to comply with new legislation on lending policies and track learning activities across bank branches, etc. So, Capitec, with SumTotal® partner LR Learning Solutions, launched a companywide talent management program dubbed “e-village” based on the
5/27/2011 9:45:00 AM

eBay—Securing the World’s Online Marketplace
As one of the largest Internet marketplaces, eBay proclaims that the trust it enables between buyers and sellers has been the key to its success. To ensure continued success, eBay wanted to standardize its network security auditing and remediation processes, and turned to QualysGuard’s vulnerability management solution. With Qualys’ automated solution, eBay can now quickly and easily remediate any network vulnerabilities.

ONLINE COMPUTER HARDWARE STORES: eBay—Securing the World’s Online Marketplace eBay—Securing the World’s Online Marketplace Source: Qualys Document Type: Case Study Description: As one of the largest Internet marketplaces, eBay proclaims that the trust it enables between buyers and sellers has been the key to its success. To ensure continued success, eBay wanted to standardize its network security auditing and remediation processes, and turned to QualysGuard’s vulnerability management solution. With Qualys’ automated solution,
10/31/2007 11:06:00 AM

How to Build a Business Case for Lighthouse System’s Shopfloor-Online
Making a robust business case to convince management how a software solution can make a valuable contribution to your business isn’t easy. To build a successful case, you need a set of practical examples of what the software does and the benefits it can provide. Examine the strategies and problems associated with achieving your manufacturing objectives, and what the Lighthouse Systems’ solution can do to address them.

ONLINE COMPUTER HARDWARE STORES: Case for Lighthouse System’s Shopfloor-Online How to Build a Business Case for Lighthouse System’s Shopfloor-Online Source: Lighthouse Systems Document Type: Checklist/Guide Description: Making a robust business case to convince management how a software solution can make a valuable contribution to your business isn’t easy. To build a successful case, you need a set of practical examples of what the software does and the benefits it can provide. Examine the strategies and problems associated with
7/21/2008 4:41:00 PM

Creating Media-rich Online Courses for Thousands of Customer-service Employees
When the JPMorgan Chase’s Card Services organization began experiencing rapid growth across multiple sites, their performance improvement team quickly realized it would need a new content authoring solution to continue meeting its training objectives. The company chose SumTotal ToolBook authoring software to create media-rich online courses integrated with SumTotal Learning Management to deliver training and track results.

ONLINE COMPUTER HARDWARE STORES: Creating Media-rich Online Courses for Thousands of Customer-service Employees Creating Media-rich Online Courses for Thousands of Customer-service Employees Source: SumTotal Systems Document Type: Case Study Description: When the JPMorgan Chase’s Card Services organization began experiencing rapid growth across multiple sites, their performance improvement team quickly realized it would need a new content authoring solution to continue meeting its training objectives. The company chose SumTotal
5/31/2011 2:41:00 PM

Dispelling 7 Common Misconceptions about Online Backups
Are you still using tape, compact disc, or zip drives to do manual data backups? If you still don’t believe an automated online backup is the best way to protect your data, you should take a closer look. Learn what the seven misconceptions about online backups are, and why you shouldn’t worry about transferring your critical business data over the Internet—remote data backup isn’t as hard as it seems.

ONLINE COMPUTER HARDWARE STORES: 7 Common Misconceptions about Online Backups Dispelling 7 Common Misconceptions about Online Backups Source: BizDomainStore.com Document Type: Checklist/Guide Description: Are you still using tape, compact disc, or zip drives to do manual data backups? If you still don’t believe an automated online backup is the best way to protect your data, you should take a closer look. Learn what the seven misconceptions about online backups are, and why you shouldn’t worry about transferring your critical
7/13/2009 1:19:00 PM

Realizing Cost Benefits Through Perimeter-based Online Security
Malware infections are becoming more and more severe, making detecting infections before they infiltrate your server or desktop a high priority. Perimeter-based security keeps the malware—and the risks—away from your systems. Adding layers of security, particularly outside the network, can help you identify and stop Internet threats before they infect machines, expose sensitive information, and consume valuable resources.

ONLINE COMPUTER HARDWARE STORES: Cost Benefits Through Perimeter-based Online Security Realizing Cost Benefits Through Perimeter-based Online Security Source: MX Logic Document Type: White Paper Description: Malware infections are becoming more and more severe, making detecting infections before they infiltrate your server or desktop a high priority. Perimeter-based security keeps the malware—and the risks—away from your systems. Adding layers of security, particularly outside the network, can help you identify and stop Internet thre
6/28/2007 1:33:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others