Home
 > search for

Featured Documents related to »  used books search


Search Engines Used to Attack Databases
Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a

used books search  Engines Used to Attack Databases Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack. Read More...
Radio Frequency Identification (RFID)
Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID sys...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » used books search


Do More with Less: 5 Strategies Used by Successful SMB Manufacturers
A common issue facing small to medium business (SMB) manufacturers today is finding out how to increase revenue and grow business without significantly adding

used books search  with Less: 5 Strategies Used by Successful SMB Manufacturers A common issue facing small to medium business (SMB) manufacturers today is finding out how to increase revenue and grow business without significantly adding staff. With larger firms able to compete by drawing upon greater financial resources, the SMB manufacturer is at a distinct disadvantage. Find out about five ways a lean strategy for small business can help you maximize resource use and minimize overhead costs. Read More...
CMMS vs EAM: What Is the Difference?
Every enterprise asset management (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or

used books search  (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or has the broad functionality of, an EAM application. More specifically, CMMS is essentially about managing maintenance work necessary to sustain an asset, whereas EAM has more to do with managing the asset over its lifecycle to minimize cost and risk while maximizing return. This white paper explores how CMMS applications and EAM applications drive value. Read More...
Customer Relationship Malpractice
Although malpractice is usually a term used in medicine, its definition (“any instance of improper professional conduct”) shows that the term can be used in any

used books search  is usually a term used in medicine, its definition (“ any instance of improper professional conduct ”) shows that the term can be used in any profession. In my opinion, malpractice can also be found in customer relationship management (CRM).  It can result in financial damage (lost sales, penalties for not delivering on time, etc.) or loss of confidence, which can jeopardize the relationships between companies and their customers. Here’s an example of improper professional conduct I witnessed when Read More...
What I Hate About HTML5, Multi-Tenancy, and Context-Aware Computing
The terms HTML5, multi-tenancy, and context-aware computing are often-used technology buzzwords representing the current megatrends of mobility, the cloud, and

used books search  and context-aware computing are often-used technology buzzwords representing the current megatrends of mobility, the cloud, and data in enterprise software. Read on to learn the story behind these buzz-words and what to watch out for in your enterprise software research. Read More...
Top Five Mistakes When Purchasing CMMS
CMMS (computerized maintenance management software) is used by businesses to schedule work orders and manage inventory, assign tasks to appropriate personnel

used books search  maintenance management software) is used by businesses to schedule work orders and manage inventory, assign tasks to appropriate personnel, and create detailed reports that highlight areas that need improvement. The process of choosing a CMMS solution can be fairly overwhelming, as there are dozens of vendors available and each system has its own advantages and disadvantages. This white paper looks at the top five mistakes when purchasing a CMMS solution. Read More...
Case Study: Rodgers and Hammerstein Organization
Founded more than 60 years ago, the Rodgers & Hammerstein Organization (R&H) represents a wide variety of entertainment copyrights. R&H used Microsoft Dynamics

used books search  of entertainment copyrights. R&H used Microsoft Dynamics AX to gain a full picture of its business, but wanted to give all employees fast, easy access to the data they needed to serve customers. By upgrading to Dynamics AX 2009, employees now have business intelligence (BI) and workflow tracking at their desktops. Read More...
Energy-efficient Cooling for Data Centers: A Close-coupled Row Solution
Perimeter computer-room air handlers and central air-handling units have been used to cool data centers since the launch of the mainframe. But as rack power

used books search  air-handling units have been used to cool data centers since the launch of the mainframe. But as rack power grew, air delivery and heat removal challenges appeared. Row-based designs address issues of proper heat removal and cold air supply—and bring energy-efficiency advantages. Learn more about row-based solutions and the benefits they can deliver to your data center. Read More...
The Evolution of Strong Authentication
Strong authentication technologies have long been used to provide an extra layer of assurance that individuals accessing computing resources are who they say

used books search  technologies have long been used to provide an extra layer of assurance that individuals accessing computing resources are who they say they are. However, the cost of deploying and managing such systems has made their use expensive and complex. New authentication models— and methods such as software, SMS, and BlackBerry tokens—are are taking the costs out of using strong authentication. Find out how. Read More...
File Transfer IPv6 Readiness
The world is out of IPv4 addresses and the time of IPv6 is at hand. This paper explores existing file transfer technology used for bulk data exchange under the

used books search  existing file transfer technology used for bulk data exchange under the lens of IPv6 and highlights issues to consider during strategic or tactical planning. Summary results from a series of IPv6 interoperability tests involving 5 clients, 3 browsers, and 6 servers illuminate the findings and recommendations. Read More...
Ingeniux CMS
Ingeniux CMS is an enterprise Web content management platform. It is used for building Web sites, personalizing user experiences, delivering online marketing

used books search  management platform. It is used for building Web sites, personalizing user experiences, delivering online marketing capabilities and insight, and managing information across Web, mobile, social, and print channels. Ingeniux CMS supports many modern Web standards, AJAX clients, in-context editing for XHTML and XML content, integrated Web analytics, and dynamic delivery options. Ingeniux Cartella provides extensive social content management functionality such as blogs, document sharing, wikis, video, and Read More...
Case Study: Redesigning a Distribution Center
A parts distributor had poorly used space and storage media with limited material visibility resulting in frequent stock-outs. To replace its old warehouse

used books search  parts distributor had poorly used space and storage media with limited material visibility resulting in frequent stock-outs. To replace its old warehouse management system (WMS), the company decided to redesign its existing storage space and media in order to improve picking and replenishing efficiency and to reduce inventory carrying and material handling costs. Find out how a logistics modeling and design tool helped. Read More...
Busting Out of the Inbox: Five New Rules of 1to1® E-mail Marketing
Situating e-mail in a multichannel marketing plan is more complicated than it used to be. Where exactly does e-mail fit in the world of blogs, vlogs, and

used books search  more complicated than it used to be. Where exactly does e-mail fit in the world of blogs, vlogs, and podcasts—where MSN, Google, and Yahoo! call the shots? Marketers need to understand which strategies and tactics are most effective to ensure that their e-mails will be delivered, opened, and acted upon. BEGINLYX Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others