X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used pc


IBM PC Line Redrawn
IBM has decided to combine its entire desktop PC line under one name. The NetVista brand, until last week the name for IBM’s thin clients and appliance desktops

used pc  into the forward-looking brand used for their Internet appliance product line; the flip side is that none of IBM's main competitors (with the possible exception of Gateway) use a single brand name for both home and business PCs. We believe expecting the customer to remember the difference between a NetVista A20 (large enterprise), a NetVista A20m (small business), and a NetVista A20i (home) is a little much. Especially when contrasted to HP's Vectra and Pavilion lines, or Dell's Dimension and Omniplex

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Start Now

Documents related to » used pc

IBM to Demo Crusoe-based Notebook


At the upcoming PC Expo, IBM is planning to provide a technology demonstration - a ThinkPad notebook computer designed around Transmeta’s Crusoe microprocessor.

used pc   Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

used pc   Read More

Gates Previews Pen-Based Computer


Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

used pc   Read More

PC Encryption: Eyes Wide Open


While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier.

used pc   Read More

Managing Change: Service-Oriented Component Architecture


Technology can be used to achieve competitive advantages, increase customer service and loyalty, and increase efficiency, but technology can also cause vendor lock-in and escalating costs. Learn how the object orientation, and service oriented architecture features in IFS Service-Oriented Component Architecture can help develop agile business software.

used pc   Read More

Do More with Less: 5 Strategies Used by Successful SMB Manufacturers


A common issue facing small to medium business (SMB) manufacturers today is finding out how to increase revenue and grow business without significantly adding staff. With larger firms able to compete by drawing upon greater financial resources, the SMB manufacturer is at a distinct disadvantage. Find out about five ways a lean strategy for small business can help you maximize resource use and minimize overhead costs.

used pc   Read More

CMMS vs EAM: What Is the Difference?


Every enterprise asset management (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or has the broad functionality of, an EAM application. More specifically, CMMS is essentially about managing maintenance work necessary to sustain an asset, whereas EAM has more to do with managing the asset over its lifecycle to minimize cost and risk while maximizing return. This white paper explores how CMMS applications and EAM applications drive value.

used pc   Read More

Case Study: Rodgers and Hammerstein Organization


Founded more than 60 years ago, the Rodgers & Hammerstein Organization (R&H) represents a wide variety of entertainment copyrights. R&H used Microsoft Dynamics AX to gain a full picture of its business, but wanted to give all employees fast, easy access to the data they needed to serve customers. By upgrading to Dynamics AX 2009, employees now have business intelligence (BI) and workflow tracking at their desktops.

used pc   Read More

Winning Outsourcing Strategies


Outsourcing is increasingly used to reduce costs and increase value—but it has its risks. As companies look to push more of their custom software application development needs to outsourcing partners, you need to plan carefully to build stringent security requirements into contracts and create metrics to ensure those requirements are met. Find out how to increase the value and reduce the risk of outsourcing.

used pc   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

used pc   Read More