Home
 > search for

Featured Documents related to » overviews of security software articles



ad
Get Free HR Software Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » overviews of security software articles


OS SmackDown!
In the latest escalation in the battle between Windows and Linux, directions on how to replace each with the other have been published on the Web by their respective champions.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: OS SmackDown! OS SmackDown! R. Krause - January 12, 2000 Read Comments Event Summary Recently, Microsoft published instructions on how to remove Linux OS and install Windows 2000/NT4 on the newly-freed-up disk drive. Not to be outdone, Linux-philes have countered by publishing instructions on how to remove a Windows OS and replace it with Linux. To close the circle, Paul Ferris, Editor at Linux Today, highlighted the silliness by publishing his own mostly-joking piece on how to uninstall both Windows and
1/12/2000

A Sharp ASP
Sharp Microelectronics of the Americas has selected Harbinger as their Application Service Provider of choice. The multi-year contract will allow Harbinger to integrate e-Procurement and business applications across Sharp's e-Supplier community.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: A Sharp ASP A Sharp ASP A. Turner - July 14, 2000 Read Comments A. Turner - July 14, 2000 Event Summary On June 14, 2000, Harbinger Corporation, a supplier of business-to-business (B2B) e-Commerce solutions, announced it has been selected by Sharp Microelectronics of the Americas (SMA) as its Application Service Provider (ASP). Under the multi-year contract, Harbinger will begin work to expand Sharp s e-Supplier community and integrate e-Procurement transactions via a suite of applications hosted for
7/14/2000

What is SRFM?
The planning, execution and partner collaboration processes of nearly all companies today are driven by a

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: What is SRFM? What is SRFM? Blake Johnson - April 23, 2004 Read Comments Introduction The planning, execution and partner collaboration processes of nearly all companies today are driven by a plan , itself typically part forecast, part performance target. Together, the plan and these core processes are at the heart of almost everything a company does—from MRP output, to commitments to customers and suppliers, to internal performance targets and the bonuses that depend on them, to the financial
4/23/2004

i2 To Power Best Buy
Since introducing its first cavernous superstore in 1989, the Minnesota-based discount retailer has grown rapidly to over 350 stores in 39 states. The company now hopes to replicate the success of its brick-and-mortar business in cyberspace.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: i2 To Power Best Buy i2 To Power Best Buy Steve McVey - June 29, 2000 Read Comments S. McVey - June 29, 2000 Event Summary Consumer electronics supermarket Best Buy, Inc. announced it would license a suite of supply chain management applications from i2 Technologies to help it integrate strategic planning with merchandise and financial planning, enhance its ability to sell merchandise over the Internet, and link operations of its online and retail stores. Best Buy will implement i2 s applications for
6/29/2000

A Tour of the Clouds
Read this article to discover some of the basic ideas behind the cloud computing phenomenon—a concept that might change the way we understand the computing process. The term “cloud computing” might be the next biggest trend in the IT industry. Jorge Garcia explains some of the basic ideas behind cloud computing—and how it may help your organization in the future.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: A Tour of the Clouds A Tour of the Clouds Jorge García - June 22, 2010 Read Comments While the word Internet has been one of the most important computer terms in recent history, there has not been another term as attractive as “cloud computing.” Today, this term could be representing the next biggest trend in the information technology industry. This article will explain some of the basic ideas behind the cloud computing phenomenon—a concept that might change the way we understand the computing
6/22/2010 10:15:00 AM

Retail Systems: A Primer
The core components of a retail information system are inventory management, inventory optimization, revenue management, sales management, and reports and inquiries. Non-core components can include financial, supply chain management, enterprise resource planning, customer relationship management, and warehouse management systems.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: Retail Systems: A Primer Retail Systems: A Primer Caroline Lam - March 13, 2006 Read Comments Introduction Although many people recognize technology terms such as enterprise resource planning (ERP) or supply chain management (SCM), RMM and MMS are acronyms that lack such widespread awareness. Moreover, the terms retail merchandise management system (RMM) and merchandise management system (MMS) likely have little more market recognition than their acronyms. Despite their relative anonymity, these systems,
3/13/2006

Ads are us , boasts CMGI
In the month of September Internet giant CMGI made three separate acquisitions of companies involved in advertising and profiling, giving it coverage in almost all sectors of the Internet advertising market.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: Ads are us , boasts CMGI Ads are us , boasts CMGI D. Geller - October 1, 1999 Read Comments Event Summary On September 30, 1999 CMGI announced its purchase of Flycast Communications (Nasdaq: FCST) for $559 million. The agreement followed on the heels of CMGI s purchase of AdForce (Nasdaq: ADFC) for $500M on September 20 and the purchase of AdKnowledge for $193 million by CMGI s majority owned subsidiary Engage (Nasdaq: ENGA). Prior to this outlay of $1.252 billion over 10 days, Engage had paid $30
10/1/1999

Cash Management 101
Cash management is an essential business process all organizations must perform to survive. Though cash management uses automation for much of the “grunt” work, it is human intelligence in the financial decision making that does the rest.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: Cash Management 101 Cash Management 101 Leslie Satenstein - August 13, 2008 Read Comments Cash management is a need common to both large and small businesses alike. In its simplest terms, cash management is the assurance that today s receivables plus today s account balances exceed today s payables. Failure to practice this business management process guarantees bankruptcy. Every large organization has a cash management group, sometimes called the treasury . This group s function includes management of
8/13/2008

Antidisintermediation
The mantra of most e-commerce ventures is usually “Change the way that business is done.” eSprocket thinks that the way business is done is just fine, thank you. Their goal is to enable instead of replace.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: Antidisintermediation Antidisintermediation D. Geller - May 31, 2000 Read Comments D. Geller - May 31, 2000 Event Summary There are $400 billion worth of used capital equipment to be traded. eSprocket wants to bring the business online without bypassing the processes and brokers that make it work. eSprocket observes that less than 5 percent of this huge market occurs in auctions. The reason, they suggest, is that used capital equipment items are not commodity items, as new ones might be. Even beyond the
5/31/2000

The Third Paradigm
Supply chain systems to date have represented the back-end of that process of servicing markets and have taken us a long way in replacing assets with information. But the fact is, building products still takes a long time. Contrastingly, markets require short response times--days. For the last few years, we have begun the process of trying to understand the unplanned event. The first and second paradigm systems deal in knowns--this is what I think I need and therefore this is what I will buy. The Third Paradigm focuses on the uncertainty elements to understand risk. This is the key. Isolate, understand and organize the chaos—creating an operational and financial model.

OVERVIEWS OF SECURITY SOFTWARE ARTICLES: The Third Paradigm The Third Paradigm Ann Grackin - January 28, 2005 Read Comments The Third Paradigm Featured Author - Ann Grackin Introduction Over the last few years, we have evolved supply chain practices and systems from industrial age concepts to the information age—an age rich with connectivity and data. This has allowed us to change the foundational structure on how we manage the enterprise. The information age that brought us supply chain systems has allowed us to begin to control the chaos
1/28/2005


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others