Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free HR Systems Comparisons
Find the best HR software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Gates Previews Pen-Based Computer
Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.
: Gates Previews Pen-Based Computer Gates Previews Pen-Based Computer R. Krause - November 15, 2000 Read Comments R. Krause - November 15, 2000 Event Summary November 13, 2000 Microsoft chairman Bill Gates used his keynote speech at Comdex to unveil a proof of concept system Microsoft calls its Tablet PC . The Tablet is a little over two pounds, and expected to be around the size of a legal pad. Gates apparently believes pad/tablet PCs and pen-based computing are the next big thing(s) in the PC
What’s Up with Computer Associates?
In a series of radical moves, Computer Associates appears to be trying to re-direct its gargantuan operations. After missing its numbers in the first calendar quarter (CA’s 4th fiscal quarter), its stock was down 59% at one point.
: What’s Up with Computer Associates? What’s Up with Computer Associates? M. Reed - October 24, 2000 Read Comments M. Reed - October 24, 2000 Event Summary In a series of radical moves, Computer Associates (NYSE: CA) appears to be trying to re-direct its gargantuan operations (it is the third largest software firm in the United States, behind Microsoft and Oracle). After missing its numbers in the first calendar quarter (CA s 4th fiscal quarter), its stock was down 59% at one point. Here is a partial
Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has previously failed to make inroads in the consulting arena, and they feel e-business is the way to fix the problem.
: Computer Associates Goes E-Business in a Big Way Computer Associates Goes E-Business in a Big Way M. Reed - April 27, 2000 Read Comments M. Reed - April 27th, 2000 Event Summary Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. In addition to product integration with the Jasmine ii product, the acquisition of Sterling Software, and the reorganization of their service and sales staffs, they are focusing on
Options for Backing Up Your Computer
What makes your computer valuable is your data. While you can always purchase a replacement computer, you’re not too likely to find one at the local computer store that comes preinstalled with your business records, family photos, personal documents, and other data you have saved on your computer over the years. Read this white paper to learn about backing up your computer and data recovery services.
: for Backing Up Your Computer Options for Backing Up Your Computer Source: Eset Document Type: White Paper Description: What makes your computer valuable is your data. While you can always purchase a replacement computer, you’re not too likely to find one at the local computer store that comes preinstalled with your business records, family photos, personal documents, and other data you have saved on your computer over the years. Read this white paper to learn about backing up your computer and data
12/14/2012 4:12:00 PM
Reducing Computer System Power Consumption through Disk Defragmentation
You may already know what disk defragmentation software does and what the benefits are. Take a closer look at the benefits in performance, cost, time-to-complete, wattage consumed for each test, and overall kilowatt hours (KWHs) consumed with Diskeeper defragmentation software. All tests, including methodology, format, and protocols, were performed with a focus of determining power and cost savings. Learn more.
: Reducing Computer System Power Consumption through Disk Defragmentation Reducing Computer System Power Consumption through Disk Defragmentation Source: Diskeeper Corporation Document Type: White Paper Description: You may already know what disk defragmentation software does and what the benefits are. Take a closer look at the benefits in performance, cost, time-to-complete, wattage consumed for each test, and overall kilowatt hours (KWHs) consumed with Diskeeper defragmentation software. All tests,
9/30/2008 5:01:00 PM
Lost Your Laptop? The CyberAngel® Brings It Back
A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an affordable laptop recovery package is well worth the investment.
: A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an affordable laptop recovery package is well worth the investment. According to Safeware Insurance , a company that insures against theft, laptop theft rose 21% from 1999 to 2000. Computer Sentry Software, Inc . based in Nashville, Tennessee, was founded in 1996 by actor Robert Urich and Dyrk Halstead after Robert Urich s son s laptop was stolen. Today, the
IBM Pushes Linux into Appliances
IBM Corp. on Monday said its line of network computer terminals can now run on the alternative software system Linux.
: its line of network computer terminals can now run on the alternative software system Linux, in the latest move by the world s largest computer maker to make its products more flexible and easier to use on the Internet. IBM (NYSE: IBM), the computer maker that so far has made the broadest commitment to Linux, also said it would post instructions on its Web site for configuring Linux, and a forum for customers to share information about using Linux on IBM hardware. We are definitely embracing Linux where
Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough
Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective.
: software, what is computer security, security and computer, security for computer, about computer security, security on a computer, what is the computer security, it computer security, security of a computer, company it security, it security company Source: Dell KACE Learn more about Dell KACE Readers who downloaded this white paper also read these popular documents! Extending BI’s Reach: Anticipate Outcomes, Forecast Results, and Respond Proactively Sales Process Map Best
5/25/2012 9:50:00 AM
Computer Numerical Control (CNC) Managed Services: How an On-demand Model Can Maximize your CNC Investments
Computerized numerical control (CNC) is crucial to the successful operation of an enterprise resource planning (ERP) application, but the road to success is sometimes rocky. To surmount the challenges of meeting your CNC needs, learn how an on-demand (or CNC managed services) model can improve your return on investment, and streamline and standardize your business processes.
: Computer Numerical Control (CNC) Managed Services: How an On-demand Model Can Maximize your CNC Investments Computer Numerical Control (CNC) Managed Services: How an On-demand Model Can Maximize your CNC Investments Source: SYSTIME Computer Corporation Document Type: White Paper Description: Computerized numerical control (CNC) is crucial to the successful operation of an enterprise resource planning (ERP) application, but the road to success is sometimes rocky. To surmount the challenges of meeting your
11/21/2007 6:39:00 AM
AIM Computer Solutions, Inc
: AIM Computer Solutions, Inc. is a provider of repetitive manufacturing solutions targeted specifically for small to medium-sized automotive suppliers.
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best industry security professionals want nothing to do with helping the FBI resolve cybercrime. Recently, one of the leading Department of Justice attorneys general, well-known for expertise in successfully prosecuting cybercrime, asked TechnologyEvaluation.Com why so many security and information technology professionals snub their noses at law enforcement agencies that exist to protect our nation's vital assets - private and public. TechnologyEvaluation.Com went behind the scenes to find o
: involve a multitude of computer systems, networks, and administrators, and requires the cooperation of all system owners, and sometimes many nations, in order to find the perpetrator. Due to their love of technology, their education, training, and experience, it is not uncommon for security industry professionals to be far more qualified and adept at resolving cybercrime than law enforcement. Though the FBI thrives on reaping assistance from industry security professionals, many industry security experts
White Paper Newsletters