X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used laptop computers


Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them

used laptop computers  (unfortunately). These rules are used to make or guide business decisions, but they are not accessible or even decipherable by anyone other than the model creators. Continued availability of such systems is an information technology management issue even though it is rarely incorporated into formal information asset protection systems. There are two principle threat sources that must be considered: Physical threats such as theft, destruction, or damage to a personal computer; and intrusion threats such

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Start Now

Documents related to » used laptop computers

Are Your Company Laptops Truly Secure?


The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.

used laptop computers   Read More

Don’t Forget to Factor In Mobile ERP When Selecting a New ERP System


A 2011 study of mid-market manufacturers sought to understand the nature of demand for mobile access to enterprise resource planning (ERP) and other enterprise software. This study surveyed over 200 executives, all of whom reported involvement in software selection at manufacturing companies with more than $100 million (USD) in revenue. Read this article to learn about the current state of mobile ERP for mid-market manufacturers.

used laptop computers   Read More

PC Encryption: Eyes Wide Open


While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier.

used laptop computers   Read More

MicronPC.com, or, “Where Are They Now?”


Micron Electronics, Inc. has been trumpeting its retail partnership with Best Buy as it watches its PC sales ebb away. Too little, too late?

used laptop computers   Read More

DHC


Established in 1996, DHC (Dalian Hi-Think Computers) is a private held company. DHC offers a wide range of services to global corporations for technology driven business transformation initiatives. We provide end-to-end Information Technology (IT) services to global corporations. DHC’s reange of services address the end-to-end IT outsourcing needs of it clients. DHC’s services include IT strategy consulting, enterprise integration service, large application development, maintenance service, web solutions, quality consulting, testing, and professional training services. Business fields include Telecom, Finance, Public, Transportation, Media, Manufacture, and eGovernment. DHC has a strong global presence. Our “GDM” leverages our proximity to the clients this enables DHC to provide high quality, rapid time-to-market solutions to our more than 400 clients in a cost effective way.

used laptop computers   Read More

The Evolution of Strong Authentication


Strong authentication technologies have long been used to provide an extra layer of assurance that individuals accessing computing resources are who they say they are. However, the cost of deploying and managing such systems has made their use expensive and complex. New authentication models— and methods such as software, SMS, and BlackBerry tokens—are are taking the costs out of using strong authentication. Find out how.

used laptop computers   Read More

Intermec


Intermec is a manufacturer and supplier of automated identification and data capture equipment, including barcode scanners, barcode printers, mobile computers, RFID systems, voice recognition systems, and life cycle services.

used laptop computers   Read More

Authentic


PDG Group Model 1004 Authentic is generalised payment platform most often used for payments applications, such as consumer payment services hubs, payment gateways and conventional card-related switching, authorisation, and device-driving applications.

used laptop computers   Read More

M-Power


m-Power is an enterprise web application development platform that automates web (and mobile web) application development. Used across all industries and company sizes, m-Power lets anyone create web apps without coding.

used laptop computers   Read More

iVend Retail: Point of Sale (POS) Systems Competitor Analysis Report


A point-of-sale (POS) system helps retailers automate transactions. POS solutions are used in retail stores where sales associates must enter sales, refunds, layaways, transfers, etc. POS systems typically consist of some form of electronic cash register and may include credit or debit card processing. Such systems are generally used wherever goods or services are exchanged for monetary value, including the hotel and restaurant industry and in retail environments.

used laptop computers   Read More