X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 network tracking


Case Study: Achieving a 99.7% Guaranteed IT Asset Tracking Rate
Learn how Grant Thornton achieved a 99.7% guaranteed IT asset tracking rate across a nation-wide network of leased computers to tightly control network

network tracking  for a widely distributed network of leased computers posed some specific and complex challenges. They realized that the difference between the managed experience and what was actually on hand were two different things. To add to the challenge, the IT role was much broader with responsibility for overall security strategies, lease expenses, software license compliance and regulatory governance. On a daily basis the IT team would have to efficiently transfer computing assets between thousands of

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, IT Infrastructure

The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical types of activities that these providers perform include data center operations; network operations; backup/recovery services, data storage management services; system administration services; end user support of desktop PCs, laptops, and handheld devices; web site, or application hosting, etc.  

Evaluate Now

Documents related to » network tracking

Freeware Vendor's Web Tracking Draws Curses


The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was discovered and announced by the same security consultant who discovered, in March of 1999, that Microsoft Windows was inserting unique serial numbers into many documents created within Office 97 programs like Word and Excel.

network tracking  a partnership with advertising network 24/7 Media. Users of Comet's plug-in software who pass their cursor will see their cursors change to an icon related to the product being advertised. Preliminary results indicated that Comet's technology increases clickthroughs from 50 to 300 percent. Changing the method of calculating the serial number removes any way of tying the data collected by Comet to an individual's machine. However, privacy advocates have expressed concern about keeping these data for three Read More

Supply Chain Network Visibility and Analytics


The complexity of the global economy is a powerful motivation for companies to look for new ways to increase efficiency and productivity. That’s why companies must have the ability to transform information into meaningful, accurate insights. Most importantly, these insights must be systematically interconnected, to align business strategy with tactics through a seamless integration of analytical, transactional, and collaborative processes.

network tracking  Forward The trend in network visibility and analytics is toward embedded analytics in composite applications. Composite applications are applications that gather different services from existing applications and bundle them to new and flexible applications. Examples are distributed order management, product tracking and tracing, and sales and operations planning. On the horizon are real-time analytics that are based upon real-world events,and integrated systems that connect transactional and analytical Read More

Peregrine Welcomes Loran to Its Nest In Network Management Matrimony


In July 1999 Peregrine Systems got engaged into a strategic partnership with Loran Technologies to OEM Loran’s network management software. Now the two have tied the knot.

network tracking  base for Peregrine's InfraTools Network Discovery. This software can automatically discover all of the devices and connections of a network, creating a detailed physical map down to the port level. As a result of the integration work over the last year, this map can be downloaded to Peregrine's ServiceCenter and AssetCenter products, allowing for tracking of a company's network assets and the service incidents relating to them. Market Impact With this announcement Peregrine sends signals to its Read More

Time Tracking and Attendance Primer: Beyond the Clock


Punch clocks, clock card machines, Bundy clocks, time recorders. Most organizations are opting for newer methods to track their employees’ time and attendance. Today’s time tracking technology is not just about capturing hours—it’s about where those hours are allocated and how productive they are. TEC analyst Sherry Fox reviews some of the key features of current time tracking software and highlights some popular vendors.

network tracking  typically through the company network or via the Web, so even managers working remotely can use it to review and approve employee absences or vacations, approve timesheets, etc. Benefits of Time Tracking Technology There is no shortage in the benefits of time tracking technology. Some of these benefits include: improves data accuracy provides dynamic data that can be used for analysis later on eliminates buddy punching, or time fraud eliminates missing punch cards removes the tedious and time-consuming Read More

Evaluating the Total Cost of Network Ownership


The upfront expenses of a network comprise only 19% of the total cost. The remaining 81% can sneak up on bank management, often unaware of some subtle TCO factors

network tracking  the Total Cost of Network Ownership Brian Killian and Lynn Koller are associated with Brintech, www.brintech.com Introduction A bank devotes extensive resources to its computer network-both in human wherewithal and hard cash. The upfront costs can be high, and veiled costs compound the burden. Ultimately, an invisible price tag hangs from a computer network. Total cost of ownership (TCO) is a model that helps systems managers understand and handle the budgeted and unbudgeted costs of an IT component Read More

IP Telephony: Network Evaluation and Risk Assessment Guide


Before engaging with vendors to identify the best solution, you need to perform an evaluation of your network capabilities, and assess the potential impact to your business of a converged network. As with any network implementation, a realistic understanding of what is required to reach your objectives will enable you to ensure a successful transition to enhanced network capabilities.

network tracking  Telephony: Network Evaluation and Risk Assessment Guide Before engaging with vendors to identify the best solution, you need to perform an evaluation of your network capabilities, and assess the potential impact to your business of a converged network. As with any network implementation, a realistic understanding of what is required to reach your objectives will enable you to ensure a successful transition to enhanced network capabilities. Read More

Saudi Arabian Network Security Provokes Local Considerations


Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

network tracking  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More

Network Monitoring and Troubleshooting for Dummies


This Network Monitoring and Troubleshooting for Dummies book introduces you to common network performance management (NPM) issues and gives you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view—namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability to monitor and troubleshoot network performance efficiently.

network tracking  Troubleshooting for Dummies This Network Monitoring and Troubleshooting for Dummies book introduces you to common network performance management (NPM) issues and gives you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view—namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

network tracking  Put the “Control” in Network Access Control Identity-Driven Access Gateways manufactured by Caymas Systems allow organizations to identify, authorize, protect and audit everyone that accesses corporate data and applications.Caymas Systems was founded in 2002 by Terence Brown and Robert Bortolotto, and ceased its operations in late 2007. Source: Caymas Systems Resources Related to Identity-based NAC: Using Identity to Put the Control in Network Access Control : Network Access Control (NAC) Read More

Ariba Network to Move to SAP HANA


In keeping with its strategy to move everything to the cloud—and to the in-memory SAP HANA platform—SAP recently announced plans to move the Ariba Network to HANA by the end of 2014.

network tracking  Network to Move to SAP HANA In keeping with its strategy to move everything to the cloud—and to the in-memory SAP HANA platform—SAP recently announced plans to move the Ariba Network to HANA by the end of 2014. With 1.5 million companies in over 190 countries conducting over half a trillion in commerce on an annual basis, the Ariba Network is by far the largest and most global business-to-business (B2B) trading platform in the world. And with the move to HANA, it is expected to become the fastest Read More

Application and Network Performance Monitoring in a Virtualized Environment


As you implement a virtualized environment, knowing how to monitor and maintain them becomes yet another challenge. Monitoring network and application traffic in an environment containing one-to-many relationships between physical hardware devices and virtual application servers presents a number of concerns. Learn about the traffic flow in virtual environments, and the various visibility options and their ramifications.

network tracking  and Network Performance Monitoring in a Virtualized Environment As you implement a virtualized environment, knowing how to monitor and maintain them becomes yet another challenge. Monitoring network and application traffic in an environment containing one-to-many relationships between physical hardware devices and virtual application servers presents a number of concerns. Learn about the traffic flow in virtual environments, and the various visibility options and their ramifications. Read More

Spinnaker Network Solutions


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

network tracking  Network Solutions Read More

Insider's Guide to Network Automation


In The Insider's Guide to Network Automation, you'll learn about the keys to successful network automation, including.

network tracking  s Guide to Network Automation Insider's Guide to Network Automation How can you reduce costs and improve the overall performance and stability of your network? Not easily. Networks are complex and prone to security issues, making cost-effective network management an elusive goal. That's why many IT managers are turning to network automation. Good network automation offers superior network management—along with increased efficiencies and reduced costs. In The Insider's Guide to Network Automation Read More

School Improvement Network


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

network tracking  Improvement Network Read More