X
Browse RFP templates
Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the success of your software selection project.
Browse Now


Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 personal computer history


Dell Jumps Into Internet PC Arena
Dell Computer Corp. has announced that it is taking orders for its new Webpc, Dell's first product from its Web Products Group, and its first foray into the

personal computer history  Jumps Into Internet PC Arena Event Summary 11/30/99 - Dell Computer Corp. announced the Webpc, which features an Intel Celeron 433 megahertz processor, a 15-inch monitor, a printer and one year of DellNet Internet service. Prices for the new computers start at $999. In a press release Tuesday, the company said the Webpc is the first product from its Web Products Group and is part of its strategy of embracing the Internet in every facet of its business. This marks Dell's entry into the market of

Read More


Browse RFP templates

Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the succes of your software selection project.

Browse Now
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Help Desk for the Health Care Industry

Help Desk is an application for assisting and managing calls for support from computer users. It also includes computer and software inventory tracking along with technical support knowledge bases.  

Evaluate Now

Documents related to » personal computer history

What's Your Global Market Price?


Thoughts on global trade, outsourcing, and your pay--how we can stop the downward pressure on wages and salaries.

personal computer history  the low cost provider—your personal salary—you need to lead the management revolt. Enterprises are composed of people—us. Be part of a transformation to differentiation and growth. This article is from Parallax View, ChainLink Research's on-line magazine, read by over 150,000 supply chain and IT professionals each month. Thought-provoking and actionable articles from ChainLink's analysts, top industry executives, researchers, and fellow practitioners. To view the entire magazine, click here . About Read More

Enterprise Applications--The Genesis and Future, Revisited Part Two: 1990s--Enterprise Resource Planning


Integrated enterprise resource planning (ERP) software solutions became synonymous with competitive advantage, particularly throughout the 1990's. Customers were demanding to have their products delivered when, where, and how they wanted them. Companies were therefore compelled to develop and embrace the philosophies of just in time (JIT) and closer supplier partnerships as a way to remain competitive.

personal computer history  the advent of the personal computer (PC) revolutionized once again the face of business management systems. At a fast pace, the large inflexible mainframes were replaced by new client/server technology. The power of these small PCs exceeded the power of the large mainframes that were routine only a few years earlier. It became possible to run a fully integrated MRPII system on a small PC. Still, these systems have trickled down slowly from large to smaller enterprises. Many manufacturing enterprises were Read More

ROI Systems Defies The Odds Through Delighted Customers Part Three: Strengths, Challenges and User Recommendations


ROI System is definitely a "user's vendor" that should raise the bar for customer care best practices amongst its competitors.

personal computer history  its own software called Personal Workstation Software (PWS) to enable MANAGE 2000 to run on a rich Windows client. For sales order processing (SOP) and service management modules, ROI had to disconnect the application presentation code from the database server and to replace its then PWS thin client client/server user interface with a Microsoft ASP Internet enabled graphical user interface (GUI). The vendor is currently developing a Microsoft ASP.NET thin client presentation layer for almost the entire Read More

Symantec Swallows AXENT; Takes on Network Associates


Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

personal computer history  enterprise firewall or a personal firewall, you're better off calling Symantec. If you're looking for virus protection, either company is a safe bet. If you're an investor, and the IT security segment keeps growing at its continuing rapid pace, both companies could be good investments, though TEC would put its bets on Symantec. Read More

Financial IT Reg Enforcement Service: Using FFIEC Security Best Practices to Ensure Laptops and PCs are Secure and Compliant


Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance.

personal computer history  require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance. Read More

Block Unprecendented Assault on Your Customers' Personal and Financial Data


Find out more in winning the pci compliance battle, a practical guide to pci compliance, including a comprehensive plan for the secure handling, pr...

personal computer history  Assault on Your Customers' Personal and Financial Data If some of the biggest names can get caught off guard, how can you prevent it from happening to you? Bank of America, Citigroup, Polo Ralph Lauren, Hotels.com, and CardSystems Solutions have all suffered negative publicity and financial losses due to a major data security breach. You can protect yourself—with the industry's easiest, most cost-effective and highly automated solution for securing your network and achieving payment card industry (PCI) Read More

Technology Challenges of Distributed, Multiplayer Virtual Environments


To play any popular online computer game, all a user needs is a computer and an Internet connection. But there’s a lot more going on behind the scenes than this gamer may realize. In order to interact in a shared virtual environment, the system the user connects to requires technology capable of creating, operating, and modifying persistent, distributed, three-dimensional virtual worlds.

personal computer history  Challenges of Distributed, Multiplayer Virtual Environments To play any popular online computer game, all a user needs is a computer and an Internet connection. But there’s a lot more going on behind the scenes than this gamer may realize. In order to interact in a shared virtual environment, the system the user connects to requires technology capable of creating, operating, and modifying persistent, distributed, three-dimensional virtual worlds. Read More

Resistance is Futile: Computer Associates Assimilates yet another Major Software Firm


Once again, Computer Associates is executing the largest software acquisition in history, eclipsing its Platinum Technology buyout of 1999, which was the previous record holder.

personal computer history  is Futile: Computer Associates Assimilates yet another Major Software Firm Event Summary ISLANDIA, NY and DALLAS, TX, February 14, 2000 -Computer Associates International, Inc. (NYSE: CA) announced an agreement to acquire Sterling Software, Inc. (NYSE: SSW), extending its arsenal of software and services to build, deploy, manage and secure eBusiness solutions. The $4 billion stock-for-stock acquisition, which would be the largest ever in the history of the software industry, has been approved Read More

Spyware versus Viruses


At first glance, spyware and computer viruses appear to have much in common. But in fact, spyware is a unique challenge. Unlike viruses, the motivation behind spyware is financial, which has driven rapid technical innovation and broad distribution. The first line of defense is education; understanding the unique threat spyware poses is the first step in a plan for protection.

personal computer history  enabling them to violate personal privacy, access proprietary information, and steal fi nancial assets. This was the case in a recent headline-making cyber theft in which spyware was used to steal $423 million from Sumitomo Mitsui bank. In addition, even “legitimate” adware programs make a signifi cant negative impact on productivity. They often slow system performance, cause PC crashes, and result in lost time while infected systems are repaired. According to a Microsoft estimate, spyware causes Read More

Demartek


Demartek is a computer industry analyst organization with its own on-site computer test lab for the purpose of validation testing, performance testing, and power efficiency or other types of testing.

personal computer history  Demartek is a computer industry analyst organization with its own on-site computer test lab for the purpose of validation testing, performance testing, and power efficiency or other types of testing. Read More

Ensure Ongoing User Competency with OnDemand Personal Navigator In-application Performance Support


User proficiency is critical to software implementations. Without competent users, your implementation will probably fail, and the return from your software investment will be less than anticipated. Unfortunately, this is a common occurrence, often attributable to lags between training and the go-live date. In-application performance support is thus of tangible benefit to users—and to your organization as a whole.

personal computer history  User Competency with OnDemand Personal Navigator In-application Performance Support User proficiency is critical to software implementations. Without competent users, your implementation will probably fail, and the return from your software investment will be less than anticipated. Unfortunately, this is a common occurrence, often attributable to lags between training and the go-live date. In-application performance support is thus of tangible benefit to users—and to your organization as a whole. Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

personal computer history  more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard says, This workgroup was formed to define the necessary set of capabilities for a security subsystem that would allow a system integrator and solution provider to establish trust on a hardware platform. The Alliance also stated that personal computers lack a standard set of system hardware-based functions needed to establish trust on the platform. The cited mission is Read More

Computer Manufacturers Shifting Their Focus to Start-Ups


Sun Microsystems and Gateway have announced initiatives designed to make their products and services more appealing to start-up companies, especially those where cash may be a little tight.

personal computer history  Manufacturers Shifting Their Focus to Start-Ups Computer Manufacturers Shifting Their Focus to Start-Ups R. Krause - August 18, 2000 Event Summary In July Sun Microsystems, Inc. announced the iForce Startup Community, an industry first marketplace designed to address dot-com customer requirements through cross-market collaboration. The community interacts online through the iForce Startup Community portal, where startups can find news, events, interactive forums and vendor information, and where Read More

Microsoft’s Latest Acquisitions: Who Benefits?


Microsoft recently acquired four vertical solutions that target process manufacturing (Fullscope Inc.), professional services (Computer Generated Solutions Inc.), and retail industries (To-Increase and LS Retail ehf).  These acquisitions are no different from any other software industry vendor acquisition, as each player in the enterprise resource planning (ERP) space is trying to expand its

personal computer history  Latest Acquisitions: Who Benefits? Microsoft recently acquired four vertical solutions that target process manufacturing ( Fullscope Inc .), professional services ( Computer Generated Solutions Inc. ), and retail industries ( To-Increase  and LS Retail ehf ).  These acquisitions are no different from any other software industry vendor acquisition, as each player in the enterprise resource planning (ERP) space is trying to expand its reach of features and functions in a  variety of vertical Read More