X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used computer laptop


Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them

used computer laptop  20% of the data used to run a company resides in its mainframe systems. Older studies showed that more than 50% resided in unstructured formats in file cabinets and the remainder was stored in personal files. Today, the personal computer has assumed the role of personal and even work group file cabinet. However, it has not assumed its privacy, security, and asset management capabilities. Work group file cabinets are obviously company property, as are their contents. Ownership of data in personal

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Help Desk for the Health Care Industry

Help Desk is an application for assisting and managing calls for support from computer users. It also includes computer and software inventory tracking along with technical support knowledge bases.  

Evaluate Now

Documents related to » used computer laptop

A How-to Guide for a Radio Frequency Identification Site Survey


As organizations prepare for a radio frequency identification (RFID) implementation, they often don't understand the preliminary work necessary to begin the project. The importance of a site survey can influence the success or failure of an RFID project.

used computer laptop   Read More

PC Encryption: Eyes Wide Open


While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier.

used computer laptop   Read More

IBM to Demo Crusoe-based Notebook


At the upcoming PC Expo, IBM is planning to provide a technology demonstration - a ThinkPad notebook computer designed around Transmeta’s Crusoe microprocessor.

used computer laptop   Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

used computer laptop   Read More

People’s Role in Cyber Security: Academics’ Perspective


With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities. To examine the extent to which human factors can contribute to either preserving security standards or bringing risk to company data, the whitepaper outlines the most common employee-caused security issues in the corporate ecosystem.

used computer laptop   Read More

PLM: A New World of (More) Collaboration and Innovation


It used to be the case that PLM was perceived as being principally about CAD tools and 3D drawings and complex technical specs that no one really understood except the geekiest of PLM geeks. This perception was justified, to an extent. After all, PLM and CAD tools can be complicated, engineers and designers tend to operate in highly specialized environments, and there's a common misconception

used computer laptop   Read More

Continuous Improvement Offers CMMS Maintenance Benefits


Computer maintenance management system (CMMS) packages are excellent tools for collecting, analyzing, and reporting data and can offer insight into a process’ problem. Critical success factors for the effective use for the CMMS involves clear support from management and measurable drivers involving time, quality, and cost.

used computer laptop   Read More

Antivirus Software: Market Review


Computer viruses are spreading through the Internet at an unprecedented rate and the antivirus market is now a $3 billion (USD) a year industry. This report measures the financial health and product quality of four key industry players: Symantec, McAfee, Computer Associates, and Trend Micro.

used computer laptop   Read More

Descartes Acquires Computer Management USA


Descartes Systems Group recently acquired Computer Management USA, a U.S.-based provider of security filing solutions and air cargo management solutions for airlines and their partners. The all-cash purchase price for the acquisition was US $6.6 million.

used computer laptop   Read More

Ficus Computer Engineering, Inc.


Ficus Computer Engineering provides consulting services in the field of Web-enabled applications, e-commerce solutions, and Palm applications.

used computer laptop   Read More