Home
 > search for

Featured Documents related to » computers computer security



ad
Get Free HR Systems Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » computers computer security


Gates Previews Pen-Based Computer
Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

COMPUTERS COMPUTER SECURITY: being ideal for notebook computers and other mobile systems that require long battery life. In addition to the battery life issue, Crusoe utilizes Mobile Linux , a scaled-down version of the increasingly popular Linux OS, and something Transmeta calls Code Morphing software, which allows the processor to be compatible with x86-based applications. Microsoft does not expect the Tablet to ship until 2003 Market Impact This is interesting on a number of levels. If these products ever become a reality, they
11/15/2000

Computer Manufacturers Shifting Their Focus to Start-Ups
Sun Microsystems and Gateway have announced initiatives designed to make their products and services more appealing to start-up companies, especially those where cash may be a little tight.

COMPUTERS COMPUTER SECURITY: Gateway will initially lease computers and related equipment to help emerging businesses establish their technology infrastructure. The Gateway eBusiness Accelerator Leasing program gives emerging companies competitive options to build their important technology infrastructure with a trusted technology partner, while developing a positive credit rating. And unlike other dot-com leasing programs, Gateway s eBusiness Accelerator Leasing does not have program restrictions or membership fees - only credit
8/18/2000

What’s Up with Computer Associates?
In a series of radical moves, Computer Associates appears to be trying to re-direct its gargantuan operations. After missing its numbers in the first calendar quarter (CA’s 4th fiscal quarter), its stock was down 59% at one point.

COMPUTERS COMPUTER SECURITY: profitability of the Mastering Computers education arm (acquired with Platinum) drastically. Market Impact Computer Associates announced on October 3rd that preliminary results for the second quarter ending September 30, 2000 should be between $1.67 billion and $1.70 billion. Analysts expectations varied widely due to market uncertainty with respect to the enterprise software marketplace. This uncertainty comes as no surprise based on the beating taken by CA s competitors in this market. These included B
10/24/2000

Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has previously failed to make inroads in the consulting arena, and they feel e-business is the way to fix the problem.

COMPUTERS COMPUTER SECURITY: Computer Associates Goes E-Business in a Big Way Computer Associates Goes E-Business in a Big Way M. Reed - April 27, 2000 Read Comments M. Reed - April 27th, 2000 Event Summary Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. In addition to product integration with the Jasmine ii product, the acquisition of Sterling Software, and the reorganization of their service and sales staffs, they are focusing on
4/27/2000

The Tangled Web: Silent Threats and Invisible Enemies
Learn how protect your enterprise with Symantec Hosted Services Web Security.Read free Technology Evaluation Centers whitepapers. When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks.

COMPUTERS COMPUTER SECURITY: Viruses , Network of Computers . The Silent War In the not so distant past, businesses used a simple technique to avoid computer viruses or malware: They cautioned their employees to not-click on dubious looking email attachments. Those days are long gone. Today companies face network threats that are often unseen, narrowly targeted and much more difficult to detect. Anonymity, deceit and subterfuge are now well-established weapons in the arsenal of cyber-criminals. These criminals target organizations
1/19/2010 2:12:00 PM

Non-restrictive Technology in Computer-based Businesses and Services
Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology in place, users can use workstations as they desire, but downtime and technical support costs are eliminated.

COMPUTERS COMPUTER SECURITY: Non-restrictive Technology in Computer-based Businesses and Services Non-restrictive Technology in Computer-based Businesses and Services Source: Faronics Document Type: White Paper Description: Typically, there are two approaches to managing public access and workplace workstations: the lock-down approach, and the reactionary approach. However, despite the variety of public access or corporate computer environments that exist, non-restrictive technology is applicable to all of them. With this technology
4/9/2007 6:50:00 PM

Computer Decisions International, LLC


COMPUTERS COMPUTER SECURITY: Computer Decisions International (CDI) specializes in manufacturing and wholesale distribution solutions.

CSC (Computer Sciences Corporation)


COMPUTERS COMPUTER SECURITY: For more than 50 years, we at CSC have developed smart, technology-enabled solutions to solve our clients' toughest challenges, demonstrating a commitment to excellence and a passion for exceeding expectations.

Case Study: University of Nevada—Reno (UNR)
Although students at the University of Nevada’s Reno campus were generally respectful of the campus’s computers and IT policies, entertainment or malicious software often appeared on computer hard drives. This made machines less stable or even disabled them entirely. To combat the problem of computer network security, UNR found a solution that enables automatic shutdown time and safer shared computer workstations.

COMPUTERS COMPUTER SECURITY: respectful of the campus’s computers and IT policies, entertainment or malicious software often appeared on computer hard drives. This made machines less stable or even disabled them entirely. To combat the problem of computer network security, UNR found a solution that enables automatic shutdown time and safer shared computer workstations. Case Study: University of Nevada—Reno (UNR) style= border-width:0px; />   comments powered by Disqus Related Topics:   IT Asset Management (ITAM),  
5/1/2009 1:44:00 PM

Resistance is Futile: Computer Associates Assimilates yet another Major Software Firm
Once again, Computer Associates is executing the largest software acquisition in history, eclipsing its Platinum Technology buyout of 1999, which was the previous record holder.

COMPUTERS COMPUTER SECURITY: Resistance is Futile: Computer Associates Assimilates yet another Major Software Firm Resistance is Futile: Computer Associates Assimilates yet another Major Software Firm M. Reed - February 16, 2000 Read Comments Event Summary ISLANDIA, NY and DALLAS, TX, February 14, 2000 -Computer Associates International, Inc. (NYSE: CA) announced an agreement to acquire Sterling Software, Inc. (NYSE: SSW), extending its arsenal of software and services to build, deploy, manage and secure eBusiness solutions. The $4
2/16/2000

AIM Computer Solutions, Inc


COMPUTERS COMPUTER SECURITY: AIM Computer Solutions, Inc. is a provider of repetitive manufacturing solutions targeted specifically for small to medium-sized automotive suppliers.


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others