Home
 > search for

Featured Documents related to »  pki articles

ArticSoft
ArticSoft provides public key infrastructure (PKI)-enabled encryption and digital signature products. ArticSoft's products protect files, folders, e-mails

pki articles  and white papers on PKI, view online demos, or download free trials of the software. ArticSoft has over 30 years IT security experience. The company's chief executive officer (CEO), Steve Mathews, writes regular articles for Secure Computing magazine and is one of the authors of ISO/IEC 17799 (formerly BS7799). Read More...
Process Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » pki articles


Network Security Best Practices: Competitive Analysis
When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services

pki articles  servers over secure channels. PKI, for public-key certificates, is another obvious form of centralized security services which was billed as providing a universal key distribution capability for the network, but which has generally failed to fulfill many of the original benefits and capabilities initially promised with this approach. IETF MSec Working Group RFCs More recently, the IETF MSec Working Group has been working toward key distribution from a single entity called a group controller or key Read More...
TEC’s I&CM Evaluation Center (Slowly but Surely) Gaining Traction - Part I
A number of earlier TEC articles and blog entries have analyzed the nascent sales performance management (SPM) or enterprise incentives management (EIM

pki articles  I&CM Evaluation Center (Slowly but Surely) Gaining Traction - Part I A number of earlier TEC articles and blog entries have analyzed the nascent sales performance management (SPM) or enterprise incentives management (EIM) software market, which has also been one of those areas with a significant uptake of on-demand deployments. Indeed, companies of all size increasingly use software packages for sales compensation and other incentives management , to more accurately and strategically model and Read More...
'Collaborative Commerce': ERP, CRM, e-Proc, and SCM Unite! A Series Study: Baan and Parent Company, Invensys
Baan is now iBaan, fully focused on the Internet via Portals and web technologies, across CRM, ERP, and SCM spaces.

pki articles  Collaborative Commerce': ERP, CRM, e-Proc, and SCM Unite! A Series Study: Baan and Parent Company, Invensys 'Collaborative Commerce': ERP, CRM, e-Proc, and SCM Unite! A Series Study: Baan and Parent Company, Invensys R. Garland - September 20, 2001 Introduction  In the early 90's, ERP came of age. Everyone had to have the functionality ERP packages promised. Since then, as Web and Internet technologies have matured, CRM on the front end, and e-Procurement and Supply Chain Management on the back end, Read More...
Symantec Swallows AXENT; Takes on Network Associates
Symantec has filed an intent to purchase AXENT in a stock-for-stock transaction of $975 million.

pki articles  when it comes to PKI development, Protocol Analyzers, and Vulnerability Assessment products. However, if Symantec gobbled up ISS, a PKI vendor, and a competing protocol analyzer tool, Network Associates could be in for a head-on collision with Symantec. The Symantec AXENT firewall beats Gauntlet by a long shot, and on the virus front, they are probably neck and neck. So what does this mean for users? If you're looking for a PKI tool or protocol analyzer, you're still better off calling Network Read More...
Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

pki articles  the certificate for the PKI is generated. Any number of safe creators can be defined. 2.11. Certificates and keys An important principle and advantage of Secure Folder is that of certificate-based authentication. This method depends on certificates that conform to the X.509v3 standard. The certificates themselves contain various items of information, which allow the software to authenticate the user, and can also serve as authorization for the user to access certain functionalities. A user's certificate Read More...
Best Practices for Implementing BI in ERP-centric Environments
Business intelligence (BI) is a priority for many organizations, promising enhanced visibility and improved efficiencies. But for those with existing enterprise

pki articles  Practices for Implementing BI in ERP-centric Environments Business intelligence (BI) is a priority for many organizations, promising enhanced visibility and improved efficiencies. But for those with existing enterprise resource planning (ERP) systems, implementing or updating a BI program raises especially interesting challenges. This set of vendor-neutral articles outlines best practices for creating or optimizing BI programs that effectively leverage existing ERP investments. Read More...
MC Press Online
MC Press Online is a publisher of education and training materials, including books and articles. Articles and code libraries are available on the company@s

pki articles  Press Online MC Press Online is a publisher of education and training materials, including books and articles. Articles and code libraries are available on the company’s website, along with a buyer’s guide that lists industry products and services. Read More...
SignalDemand: Dealing with Supply- and Demand-side Pricing Matters - Part 1
In TEC's previous articles and blog posts about pricing management and optimization vendors like Zilliant, Vendavo, DemandTec, Servigistics or Revionics, the

pki articles  Dealing with Supply- and Demand-side Pricing Matters - Part 1 In TEC 's previous articles and blog posts about pricing management and optimization vendors like Zilliant , Vendavo , DemandTec , Servigistics   or Revionics , the main focus was on finished goods (including spare parts). Whether these final products are sold at retail shelves to consumers or dealt directly between trading partners, their proper pricing is meant to create demand and profitability for the seller. In other words, Read More...
KSignPKI
KSign@s PKI solution issues digital certificates to authenticate users with digital signatures. The application offers various features to e-commerce

pki articles  KSign’s PKI solution issues digital certificates to authenticate users with digital signatures. The application offers various features to e-commerce applications in a wireless environment, including issuance of certificates, registration of users, time stamps, and real-time certificate verification. Read More...
TEC Newsletter, What Makes it Worthy?
Do you still read tech/business industry e-mail newsletters? In the early days of the Web, I remember going to a conference talking about the importance of

pki articles   Read More...
Curbing MESsy Shop Floor State of Affairs - Part II
Part I of this blog series expanded on some of TEC's earlier articles about companies' need for better links between the plant (

pki articles  MESsy Shop Floor State of Affairs - Part II Part I of this blog series expanded on some of TEC 's earlier articles about companies' need for better links between the plant ( blue collar trenches ) and the enterprise ( white collar ivory tower ). It also pointed out the difficulties in achieving this idea. An obvious solution would be a tightly integrated enterprise resource planning (ERP) and manufacturing execution system (MES) package that would help manufacturers close the gap between the shop Read More...
Vendor Viability (Size) vs. Customer Intimacy
After almost a decade of following the enterprise applications market via insightful, sometimes exhaustive (and exhausting) free research articles (which will

pki articles  Viability (Size) vs. Customer Intimacy After almost a decade of following the enterprise applications market via insightful, sometimes exhaustive (and exhausting) free research articles (which will continue to go on in earnest and continue to be rated by our readers), the time has come for me to be in tune with the Web 2.0 and related social networking. In other words, the time has come for my blog at TEC, and the dilemma was then what to start with. Well, given that facilitating impartial software Read More...
How Project Management Can Help Manufacturers
Recently there were two great articles published on our Website touching the interesting problem of interactions between traditional manufacturing management

pki articles  Project Management Can Help Manufacturers Recently there were two great articles published on our Website touching the interesting problem of interactions between traditional manufacturing management and project management: The Business Model for the 21st Century Is Project-centric and Weather the Recession with Project ERP . I agree with the respective authors that the project-driven management approach can help companies improve their businesses in any kind of economic situation, whether during a Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others