Home
 > search for

Featured Documents related to » peoplesoft security



ad
Get Free HR Software Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » peoplesoft security


PeopleSoft Plays Hardball
No more a nice guy with PeopleSoft! Its strong Q4 2000 results and alleged string of wins over its direct competitors have stirred up some emotions and knee-jerk dismissive reactions. Whatever the case may be, look for a vigorous PeopleSoft participation in many future software selection deals.

PEOPLESOFT SECURITY: PeopleSoft Plays Hardball PeopleSoft Plays Hardball P.J. Jakovljevic - March 9, 2001 Read Comments P.J. Jakovljevic - March 9, 2001 Event Summary On January 30, PeopleSoft Inc. (NASDAQ: PSFT), one of the largest business applications providers, announced record financial results for the quarter ended December 31, 2000. Total revenue of $498 million was the highest reported in company history, and was up 34% over $372 million in the same quarter of 1999 (See Figure 1). The company touted strong market
3/9/2001

Commerce One Goes High, Wide and PeopleSoft
E-procurement powerhouse Commerce One creates business-to-business marketplaces in Canada and Latin America It has also launched a phalanx of portals in partnership with PeopleSoft.

PEOPLESOFT SECURITY: Goes High, Wide and PeopleSoft Commerce One Goes High, Wide and PeopleSoft D. Geller - December 22, 1999 Read Comments Event Summary Commerce One (NASDAQ: CMRC) announced a broad range of initiatives in E-procurement. Continuing in its apparent strategy to dominate E-procurement outside of the United States (See TEC News Analysis article: Commerce One to Procure for the Antipodes...and Elsewhere ), the company will partner with TD Bank Financial Group (NYSE/TSE: TD) to build an electronic marketplace
12/22/1999

Understanding the PCI Data Security Standard
Understanding the PCI Data Security Standard.Secure Documents and Other Computer Software to Use In Your Complex System of Understanding the PCI Data Security Standard. The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance.

PEOPLESOFT SECURITY: Understanding the PCI Data Security Standard Understanding the PCI Data Security Standard Source: Symantec Document Type: White Paper Description: The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC
9/3/2009 4:36:00 PM

Should PeopleSoft be Overly Happy?
PeopleSoft announced financial results and major highlights for the quarter ended March 31.

PEOPLESOFT SECURITY: Should PeopleSoft be Overly Happy? Should PeopleSoft be Overly Happy? P.J. Jakovljevic - June 1, 2000 Read Comments P.J. Jakovljevic - June 1, 2000 Event Summary In April, PeopleSoft announced financial results for the quarter ended March 31. Revenues, net income and net income per share for Q1 2000 from recurring operations were $375.4 million, $11.0 million and $0.04, respectively. This compares with revenues, net income and net income per share from recurring operations of $350.1 million, $7.9 million
6/1/2000

TCO & Security of Enterprise Grade Mobility
While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management.

PEOPLESOFT SECURITY: TCO & Security of Enterprise Grade Mobility TCO & Security of Enterprise Grade Mobility Source: BlackBerry Document Type: White Paper Description: While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and
12/27/2012 2:33:00 PM

Engineering Supply Chain Security
Ensuring a safe and secure supply chain is considered mission critical to government officials and business executives worldwide.

PEOPLESOFT SECURITY: Engineering Supply Chain Security Engineering Supply Chain Security Source: Red Arrow Supply Chain Solutions Document Type: White Paper Description: Ensuring a safe and secure supply chain is considered mission critical to government officials and business executives worldwide. Engineering Supply Chain Security style= border-width:0px; />   comments powered by Disqus Related Topics:   Regulatory and Compliance,   Supply Chain Management (SCM),   Customs and Excise Source: Red Arrow Supply Chain
9/4/2005 3:32:00 PM

PeopleSoft Strategy a Good Deal for JD Edwards Customers
Putting PeopleSoft's strategy to work for the JD Edwards community. What can the JD Edwards install-base expect from the PeopleSoft merger?

PEOPLESOFT SECURITY: PeopleSoft Strategy a Good Deal for JD Edwards Customers PeopleSoft Strategy a Good Deal for JD Edwards Customers Ann Grackin - September 17, 2003 Read Comments Event Summary The executive team of the new PeopleSoft addressed a tough audience of financial and industry analysts this day. We got to ask them the tough questions on the JD Edwards/PeopleSoft merger. This merger is about product expansion, not consolidation is Craig Conway s (CEO of PeopleSoft) commitment and mantra to customers and
9/17/2003

PeopleSoft Revamps World for Its Mid-Market Express ConquestPart Two: Market Impact
The major factors of success in business applications for the mid-market segment have traditionally been--flexible pricing, packaging and deployment options; speed of implementation; vertical focus; interconnectivity to other applications and legacy systems; product scalability and scope expandability; Internet and wireless device accessibility; low cost business-to-business (B2B) electronic connectivity; and a single point of contact possibly with a local consulting and implementation support. PeopleSoft seems to have captured (or at least tackled) most of these.

PEOPLESOFT SECURITY: PeopleSoft Revamps World for Its Mid-Market Express Conquest Part Two: Market Impact PeopleSoft Revamps World for Its Mid-Market Express Conquest Part Two: Market Impact P.J. Jakovljevic - July 27, 2004 Read Comments Market Impact Recently inaugurated as the No. 2 leading business applications provider after digesting the former J.D. Edwards & Company , PeopleSoft , Inc. (NASDAQ: PSFT), has been making decisive moves to deliver a number of new, and refurbished solutions, in a great part by
7/27/2004

Cost Benefits of Complete Change Life Cycle Management for PeopleSoft
In hard economic times, IT organizations can maintain operational excellence and sustain service quality while still reducing costs. Achieving this objective involves at least three aspects of application management: managing change, managing technical performance, and managing user performance. Learn more about managing the change process in your PeopleSoft environment, and the value of an integrated change solution.

PEOPLESOFT SECURITY: Life Cycle Management for PeopleSoft Cost Benefits of Complete Change Life Cycle Management for PeopleSoft Source: Quest Software Document Type: White Paper Description: In hard economic times, IT organizations can maintain operational excellence and sustain service quality while still reducing costs. Achieving this objective involves at least three aspects of application management: managing change, managing technical performance, and managing user performance. Learn more about managing the change
3/18/2009 3:56:00 PM

The Whitelisting of America: Security for IT » The TEC Blog
The Whitelisting of America: Security for IT » The TEC Blog TEC Blog     TEC Home     About TEC     Contact Us     About the Bloggers     Follow TEC on Twitter    RSS   Discussing Enterprise Software and Selection --> Fast, Accurate Software Evaluations TEC helps enterprises evaluate and select software solutions that meet their exacting needs by empowering purchasers with the tools, research, and expertise to make an ideal decision. Your software selection starts here. Learn more about

PEOPLESOFT SECURITY: Database Systems, eWeek, Flask, Jason Brooks, National Security Agency, NSA, Security, Selinux, Whitelisting, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
26-11-2008

Fixing Security Backdoors:
Red Hat 1, Microsoft 0

April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

PEOPLESOFT SECURITY: Fixing Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Read Comments Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based
5/9/2000


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others