X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 securities fraud


i2 Bleeds In Shark-Infested Waters
What a difference a year makes. Two months after the Nike debacle, more than a dozen class action lawsuits for securities fraud are now pending in federal and

securities fraud  IT dollars to spend. Securities fraud lawsuits are usually settled out of court for significantly less money than plaintiffs originally demand. Users concerned that litigation costs may be passed on to them in the form of license and service fees can depend on market competition to keep prices in check.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » securities fraud

With Record Revenues, AXENT Puts Down a Solid Fist


Cybercrime and information security attacks are not going to go away. AXENT's three protection products, Intruder Alert, Raptor Firewall, and NetProwler contain the most fundamental security protection products that any aspiring Internet company should include in their IT strategy - network based intrusion detection, host based intrusion detection, and an enterprise hybrid firewall.

securities fraud   Read More

Important Sarbanes-Oxley Act Mandates and What They Mean for Supply Chain Management


Two sections of the Sarbanes-Oxley Act (SOX) have major implications for supply chain management. Yet enterprises can meet the challenges created by SOX more easily by using software tools developed to simplify the processes for compliance with this law.

securities fraud   Read More

How Is Business Process Management Applicable to Financial Services?


Business process management (BPM) allows financial services companies to manage internal processes and to increase efficiency and accuracy. Organizations, especially those that deal with Sarbanes-Oxley, should focus on BPM to ensure compliance and to minimize error and risk.

securities fraud   Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

securities fraud   Read More

SAS: Striving to Sustain Leadership


SAS Institute has been successful, moving beyond a business intelligence. Lately, it has lately focused on sustaining its technology leadership, expanding in some vertical markets, and becoming more attentive to the low-end market.

securities fraud   Read More

Managing Risk through Financial Processes: Embedding Governance, Risk, and Compliance


Initiatives to automate and streamline financial processes often focus more on reducing costs than adding value. Adding the kind of value you should have in your financial processes stands at the heart of a broader initiative known as governance, risk, and compliance (GRC). Learn why embedding the components of GRC within your financial processes can help you track financial flows and alert you when things might go awry.

securities fraud   Read More

10 Common Mistakes You May Be Making When You Set User Rights and Securities


Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to user rights and securities—there are some factors that you need to take into consideration. ERP is a sophisticated system where simple mistakes can cause big problems. It is also an important investment for your company—and you’ll want to

securities fraud   Read More

Content Is King-Applying Intelligence to Unstructured Data


On March 23, I have the opportunity to lead a seminar at the info360 conference in Washington, D.C., on the use of business intelligence (BI) applications and technologies to analyze unstructured data. In preparing for this seminar, I came across an article written by Bill Gates back in 1996 entitled “Content is King.” And although the theme of that article is different from the approach of this

securities fraud   Read More

Geac Computer Corporation: Mastering Growth by Acquisitions


Geac has acquired in excess of 40 companies around the world. Geac's purchase of UK-based ERP software maker JBA International in 1999 has nearly doubled the company's size.

securities fraud   Read More

AribaPay Gets Its First Transactions


One of the brand new products announced at the recent Ariba LIVE 2014 conference is AribaPay. Unveiled last year by Ariba, an SAP Company, and Discover Financial Services, a provider of direct banking and payment services, AribaPay is a cloud-based business-to-business (B2B) payments solution designed to provide better visibility into business payments and produce rich remittance information to improve the reconciliation processes.

securities fraud   Read More