X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used books search


Search Engines Used to Attack Databases
Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a

used books search  Engines Used to Attack Databases Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Enterprise Content Management (ECM) System RFI/RFP Template

Content Authoring, Content Acquisition, Content Aggregation, Output and Content Presentation, Workflow Management, Version Control and Management, Development Tool Technical Architecture, Portal Support, Document and Records Management, Search and Indexing Management, Security Management, Digital Asset Management, Reporting and Statistics Management, Performance, Backup, and Recovery, Product Technology 

Evaluate Now

Documents related to » used books search

What I Hate About HTML5, Multi-Tenancy, and Context-Aware Computing


The terms HTML5, multi-tenancy, and context-aware computing are often-used technology buzzwords representing the current megatrends of mobility, the cloud, and data in enterprise software. Read on to learn the story behind these buzz-words and what to watch out for in your enterprise software research.

used books search   Read More

Do More with Less: The Five Strategies Used by Successful SMB Manufacturers


A common issue for small to medium business (SMB) manufacturers is how to increase revenue and grow their businesses without significantly adding staff. Unfortunately, these companies often emerge from the startup phase saddled with inefficient, manual processes that require extra people to maintain them. Learn how to position your company for more predictable business growth, without a reliance on adding more people.

used books search   Read More

CMMS vs EAM: What Is the Difference?


Every enterprise asset management (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or has the broad functionality of, an EAM application. More specifically, CMMS is essentially about managing maintenance work necessary to sustain an asset, whereas EAM has more to do with managing the asset over its lifecycle to minimize cost and risk while maximizing return. This white paper explores how CMMS applications and EAM applications drive value.

used books search   Read More

Software Test Tools RFI/RFP Template


Used in Design, Used While Coding, Used While Testing, Test Support Tools, General Functionality, Integration with Other Tools, Testable Platform, Ease of Use and Customizable UI, Architecture, Industry, Tool Characteristics

used books search   Read More

The Next Generation of Business Intelligence


Business intelligence (BI) 2.0 is used more and more to refer to the next generation of BI solutions, which allow better access to information, and enable communication and collaboration amongst all users. But how is BI changing exactly? For one thing, BI 2.0 allows Web-based interactive reporting. Learn about other differences—and how BI 2.0 can make a difference in your organization’s data warehousing and other activities.

used books search   Read More

The Cost of Spreadsheets in Fixed Asset Management


Spreadsheets have become one of the most prevalent software applications used in businesses today, for everything from simple calculations to impromptu databases for tracking a wide range of information, including employee hours, expense reports, and fixed assets. And while spreadsheets are inherently useful in business, they are constantly being used for tasks in which they are ill-suited. Many companies use spreadsheets for financial tracking and reporting, but the negative aspects of using spreadsheets for tracking and depreciating fixed assets are substantial. This white paper describes fourteen ways that spreadsheets can fall short, and gives recommendations for implementing a dedicated asset inventory and asset accounting solution.

used books search   Read More

Surado CRM High Availability


This document provides system administrators and technical professionals an overview of how Surado SCM SQL Enterprise CRM Solution can be used in a High Availability Environment. This document assumes that you are planning on installing the Surado SCM SQL System on Windows NT 4.0 or Windows 2000 Advanced Server and will be using Microsoft's SQL Server as the primary database.

used books search   Read More

Sales Commissions and Spreadsheets-A Calculated Disaster


Spreadsheets are used in the calculation of sales commissions in most businesses. This is particularly true for small and mid-market businesses that cannot afford more robust systems. Given the common use of spreadsheets, it would be wise to understand the consequences for businesses that depend on them. In fact, the ramifications of errors in spreadsheets can be serious and dramatic.

used books search   Read More

Actian Goes Big on Data, Acquires ParAccel


It seems that Actian Corporation, provider of the famous and globally used relational database called Ingres, is repositioning itself within the big data and data management space. It has just made an interesting move towards strongly increasing its presence by acquiring ParAccel, a provider of one of the fastest analytic databases on the market. This is a major second step for

used books search   Read More

Adonis: DNS/DHCP for Small to Medium Sized Business


Small to medium businesses have typically built their own domain name system (DNS) and Dynamic Host Configuration Protocol (DHCP) services, used Windows DNS/DHCP, or turned to a hosted service provider for these services. This approach may appear to offer tremendous savings, but contains many hidden costs and risks that are not always apparent until a catastrophic loss of service occurs.

used books search   Read More