X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used notebook computers


IBM to Demo Crusoe-based Notebook
At the upcoming PC Expo, IBM is planning to provide a technology demonstration - a ThinkPad notebook computer designed around Transmeta’s Crusoe microprocessor.

used notebook computers  the areas where it focused was notebooks and mobile computing. At the time they discussed (without divulging names) partnering agreements with key manufacturers. Along with original backers Compaq Computer and Sony, they have revealed Gateway as their partner for an Internet appliance (Ref. Gateway & AOL Follow Crusoe's Footprints ). Adding IBM as their notebook partner gives them even more credibility - for now. Dell Computer has made it abundantly clear that they are currently Intel-only, so we do

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » used notebook computers

Compaq Streamlines Product Line


Compaq is simplifying its sometimes dizzying range of product offerings in its business desktop lines. This bodes well for their customers.

used notebook computers   Read More

Intel Faces 820 Chipset Problems (Again)


In the latest round of setbacks to beset Intel’s performance-oriented 820 chipset, the manufacturer announces a recall of nearly a million motherboards shipped in 1999 & 2000.

used notebook computers   Read More

How Do You Categorize Notebooks?


The notebook computer market has become one of the remaining battlegrounds for computer manufacturers. Our purpose here is to define the notebook market segments, describe what the general characteristics of each segment are, and to give users an idea of what features they can expect for each segment.

used notebook computers   Read More

Gates Previews Pen-Based Computer


Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

used notebook computers   Read More

CMMS vs EAM: What Is the Difference?


Every enterprise asset management (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or has the broad functionality of, an EAM application. More specifically, CMMS is essentially about managing maintenance work necessary to sustain an asset, whereas EAM has more to do with managing the asset over its lifecycle to minimize cost and risk while maximizing return. This white paper explores how CMMS applications and EAM applications drive value.

used notebook computers   Read More

Search Engines Used to Attack Databases


Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.

used notebook computers   Read More

Case Study: Faronics Insight and Bangor Township Schools


The teachers at Bangor Township Schools in Michigan (US) wanted a way to monitor students’ computer screens to make sure computers were being used for classroom projects and not games or messaging. Insight, Faronics’ classroom management solution, allows teachers to monitor every screen and to send warnings to students who visit inappropriate web sites. Read about the other benefits these teachers gained with Insight.

used notebook computers   Read More

Case Study: Newburgh Enlarged City School District


Schools often need to deploy computers that offer a limited feature set, as limiting a computer’s functions is important to protecting its purpose and keeping students focused. To lock down student workstation functionality, Newburgh Enlarged City School District finally implemented a solution to control system settings and application functionality. Learn more about the features and functionality of this workstation access solution.

used notebook computers   Read More

Customer Relationship Malpractice


Although malpractice is usually a term used in medicine, its definition (“any instance of improper professional conduct”) shows that the term can be used in any profession. In my opinion, malpractice can also be found in customer relationship management (CRM).  It can result in financial damage (lost sales, penalties for not delivering on time, etc.) or loss of confidence, which can jeopardize the

used notebook computers   Read More

Labor Management Systems: Optimizing Worker Productivity While Reducing Labor Costs


Labor management systems (LMSs) are used primarily as a way for distribution operations to manage and track its labor activities. This includes real-time interaction with warehouse management and warehouse control systems in order to collect data on what workers are doing, how many locations they have visited, what inventory they have handled, what equipment they have used, and what paths they

used notebook computers   Read More