X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 pc scan


PC Encryption: Eyes Wide Open
While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for

pc scan  acceptable way to enforce PC data encryption it took hold as the defacto standard. FDE, with very slight differentiation, is offered by many vendors. Years ago, this brand of security came with recognized, and in many cases, acceptable trade-offs around system performance, compatibility and employee productivity. Today, a decision to deploy FDE has an even longer list of trade-offs to consider. It is no longer the simple, easy decision. New hardware and software developments and emerging trends in

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » pc scan

7 Essential Steps to Security Risk Reduction


As management visionary and author Peter Drucker once said, “You can’t manage what you can’t measure.” No statement rings truer—especially when it comes to security risk reduction. By having an accurate depiction of your network, however, you can identify real-world security threats and learn how to evaluate your organization’s ability to respond to them. Find out how, with these seven essential steps.

pc scan   Read More

Spyware versus Viruses


At first glance, spyware and computer viruses appear to have much in common. But in fact, spyware is a unique challenge. Unlike viruses, the motivation behind spyware is financial, which has driven rapid technical innovation and broad distribution. The first line of defense is education; understanding the unique threat spyware poses is the first step in a plan for protection.

pc scan   Read More

Another Type Of Virus Hits The World (And Gets Microsoft No Less)


A number of anti-virus vendors, including Trend Micro and Computer Associates, have warned of a virus with a new approach. It is known variously as QAZ.TROJAN or QAZ.WORM, and was officially renamed to W32.HLLW.Qaz.A in September. The virus enters via unprotected shared drives and usually replaces the Notepad.Exe application, although there have been occasions where Notepad was not the victim. The virus then provides a backdoor to outside intruders, giving them in effect remote control over the computer that has been infected. This analysis contains some suggestions to protect your machines.

pc scan   Read More

Identix Leads Biometric Authentication


Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.

pc scan   Read More

uLearn & uSim


An integrated platform, uLearn can facilitate the processes associated with e-learning. From content development, to performance assessment and enhancement, from course administration to competency and learning management, uLearn provides tools that can promote efficient e-learning implementations. The uLearn platform combines a learning content management system (LCMS), a learning management system (LMS), and a virtual tutor named Aimy. The uSim simulation-based training platform allows learners to practice skills in realistic and immersive environments. With uSim, 3D virtual training environments can be created to run on a simple PC.  

pc scan   Read More

HP DeskJet, LaserJet, PhotoSmart, OmniBook, Jornada, Business Desktop PC and JetDirect Divisions to Support Bluetooth


HP is leading the way by taking action and implementing Bluetooth technology into a wide array of product offerings.

pc scan   Read More

Compaq's High-End Wintel-based Rack Servers - Working Hard to Stay #1


Compaq Computer Corporation, the #1 volume manufacturer of PC Servers, both US and worldwide, is fighting a strong challenge by Dell Computer. This note assess the strengths and weaknesses of its four-CPU rackmount servers.

pc scan   Read More

Standard Benchmark on Hewlett-Packard ProLiant Servers


In August 2006, Microsoft conducted a Microsoft Dynamics AX 4.0 standard distribution benchmark to measure the performance and scalability characteristics of the application in a simulated distribution scenario. This benchmark exercised core accounts receivables scenarios around order entry through invoicing, in addition to procure-to-pay processes around purchase order creation through receiving of goods. We look at the methodology and results.

pc scan   Read More

Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake


Dell Computer Corp. chairman Michael Dell said Thursday the company's financial performance should not be affected by September's earthquake in Taiwan.

pc scan   Read More

The Move to PCI Express in Next-generation Systems


The next-generation input/output interconnect standard for the PC industry arises from PCI Express and PICMG 1.3 specifications. However, as platforms change to incorporate these standards, they’re virtually eliminating space for high-end telephony boards. When building telephony solutions, vendors must be aware of the changes in these specifications so that they can better use current and future systems for communications applications.

pc scan   Read More