X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 web anonymous


Freeware Vendor's Web Tracking Draws Curses
The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was

web anonymous  Vendor's Web Tracking Draws Curses Event Summary Comet Systems Inc., a privately held company that gives away software that can convert your cursor into an animated shape of your choosing when you surf the Web, has been collecting information about where the estimated six to fourteen million users of the Comet Cursor point their browsers. The discovery was made by a private security consultant, Richard Smith, a founder of Phar Lap Software, who was also responsible for revealing security problems

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » web anonymous

E-mail Encryption: Protecting Data in Transit


Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre-assign various setup options before the software is rolled out, which can be locked so that the user can no longer change the default settings. Learn more about the main properties of Secure Mail and get an overview of the possible configurations the product offers.

web anonymous   Read More

“B” Before “e” When Marketing to “C”


ResponseLogic launches a personalized marketing tool based on expert systems technology. Promising to improve the bottom line of any Web business that markets to consumers, the company charges only when the product makes a valid recommendation.

web anonymous   Read More

DoubleClick Takes Bath, Throws in Towel


After weeks of being deluged by lawsuits, bad press, federal regulatory investigations and nasty name-calling, DoubleClick backs off on its plans to tie surfing behavior to personally identifiable information.

web anonymous   Read More

Adobe Releases 2014 Digital Index Online Shopping Predictions


Adobe releases its 2014 Digital Index Online Shopping Forecast for this year’s holiday season, an important guide for senior marketing and e-commerce executives across industries.

web anonymous   Read More

The Cost of Employee Web Misuse


In the white paper employee web use and misuse learn how to protect yourself from the wide range of problems your company can run into.

web anonymous   Read More

Protecting Your Network Against the Growing Danger of Web Attacks


Web-borne malware is now more common than malware entering a company through e-mail. The number of Web sites carrying malware increased by 400 percent in 2008. This can cause serious issues for your business. You need to proactively protect your networks both by instituting acceptable usage policies for employee Web usage and by implementing a solution that can effectively combat these malware intrusions. Find out how.

web anonymous   Read More

New Facts on Web Security and Online transactions


Get the new facts on Web security and what you can do keep your business thriving in Choosing the Right Security Solution: Moving beyond SSL to Est...

web anonymous   Read More

Building a Web Application Security Program


Today’s Web applications exist in an environment vastly different from when businesses first entered the Internet. Few companies have a comprehensive Web application security program to prevent Internet-borne security breaches. Learn how security concerns for Web applications are different than for traditional applications, and how to build a Web security program that curbs costs and provides effective security.

web anonymous   Read More

New Web Threats in 2009


That's why the white paper new web threats in 2009 can be a real lifesaver.

web anonymous   Read More