X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used laptop computers


Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them

used laptop computers  (unfortunately). These rules are used to make or guide business decisions, but they are not accessible or even decipherable by anyone other than the model creators. Continued availability of such systems is an information technology management issue even though it is rarely incorporated into formal information asset protection systems. There are two principle threat sources that must be considered: Physical threats such as theft, destruction, or damage to a personal computer; and intrusion threats such

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » used laptop computers

Trend Virus Control System - A Centralized Approach to Protection


Trend Virus Control System (TVCS) utilizes a web based management console, which allows for administration, configuration and policy enforcement from a central location.

used laptop computers   Read More

Are Your Company Laptops Truly Secure?


The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.

used laptop computers   Read More

PC Encryption: Eyes Wide Open


While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier.

used laptop computers   Read More

Intel Faces 820 Chipset Problems (Again)


In the latest round of setbacks to beset Intel’s performance-oriented 820 chipset, the manufacturer announces a recall of nearly a million motherboards shipped in 1999 & 2000.

used laptop computers   Read More

Intermec


Intermec is a manufacturer and supplier of automated identification and data capture equipment, including barcode scanners, barcode printers, mobile computers, RFID systems, voice recognition systems, and life cycle services.

used laptop computers   Read More

Case Study: 3form


3form, a manufacturer of resin panels used in high-design architectural projects, chose Infor Visual ERP for its flexibility and customizability to meet 3form's specific needs.

used laptop computers   Read More

Actian Goes Big on Data, Acquires ParAccel


It seems that Actian Corporation, provider of the famous and globally used relational database called Ingres, is repositioning itself within the big data and data management space. It has just made an interesting move towards strongly increasing its presence by acquiring ParAccel, a provider of one of the fastest analytic databases on the market. This is a major second step for

used laptop computers   Read More

Ingeniux CMS


Ingeniux CMS is an enterprise Web content management platform. It is used for building Web sites, personalizing user experiences, delivering online marketing capabilities and insight, and managing information across Web, mobile, social, and print channels. Ingeniux CMS supports many modern Web standards, AJAX clients, in-context editing for XHTML and XML content, integrated Web analytics, and dynamic delivery options. Ingeniux Cartella provides extensive social content management functionality such as blogs, document sharing, wikis, video, and image sharing. The application supports user authentication with single sign-on, collaborative workspaces, content approval with integrated workflow, Microsoft Sharepoint connections, and other features. Cartella integrates with Ingeniux CMS.  

used laptop computers   Read More

Protect Your Laptops Against Careless Employee Use


Find out more about endpoint security solutions and laptop security in general, in the white paper protect your laptops against careless employee u...

used laptop computers   Read More

Advertising Online - A Guide to Successful Market Penetration Part Three: Geo Targeting and Fraud Protection


The same type of technology used to identify and suppress certain types of traffic can also be used for good - geo targeting can supply geographically specific traffic to your site.

used laptop computers   Read More