X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 database encryption


Secure Folder: File or Folder Encryption
Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual

database encryption  Cryptosystem , Public Key Database , Public Key Decryption , Public Key Directory , Public Key Distribution , Public Key Enabled , Public Key Encryption , Public Key Example , Public Key Exchange , Public Key Extension , Public Key File Format , Public Key Generation , Public Key Generator , Public Key Infrastructure , Public Key Length , Public Key Location , Public Key Login , Public Key Management , Public Key Passphrase , Public Key Policy , Public Key Private , Public Key Search , Public Key Servers

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Warehouse Management Systems (WMS)

A warehouse management system (WMS) should provide database and user-level tools in order for a company to optimize its storage facilities while at the same time providing user level task direction and activity support. The WMS should enable warehouse operators to optimize pick, put-away, and replenishment functions by employing powerful system logic to select the best locations and sequences. 

Start Now

Documents related to » database encryption

NIST Certification for AES Encryption


The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform.

database encryption   Read More

PeopleSoft on Client/Server and Database Issues


To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture and database management as they relate to the PeopleSoft Enterprise Resource Planning suite of products.

database encryption   Read More

Oracle8i Release 2 - Ready to Storm the Web


On November 15, Oracle Corp., announced the pending availability of Oracle8i Release 2, the follow-on to Oracle8i, the most rapidly adopted database product ever released by the company. To date, more than 5000 "Dot Coms" and other enterprises are using Oracle8i. Additionally, over 800 Independent Software Vendors (ISVs) have developed applications and tools optimized for Oracle8i data warehousing and online transaction processing features since the product's release in March 1999. The new release has expanded analytical data warehousing functions, native support for Java2 and performance and management enhancements.

database encryption   Read More

SAP's Dr. Peter Barth on Client/Server and Database Issues with SAP R/3


To address questions for a TEC customer, we interviewed Dr. Peter Barth, Technology Marketing Manager for SAP AG in Walldorf, Germany. The conversation covered issues in the areas of client/server architecture and database management used by the SAP R/3 Enterprise Resource Planning suite of products.

database encryption   Read More

The Roaring Penguin Training Network


A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).

database encryption   Read More

Benefits of a Single Database Solution: Improved Enterprise Quality Management from IQMS


IQMS appears to be raising the competitive bar for quality management among its ERP competition with a single database software solution and seamless ERP systems access.

database encryption   Read More

IBM Announces the Release of DB2 Universal Database Version 7


IBM (NYSE: IBM) has announced the release of DB2 Universal Database Version 7, with a new pricing structure for application service providers (ASPs), support for customer relationship management (CRM), and an incubator program for e-business applications to help emerging companies get up and running on the Web.

database encryption   Read More

Facilitating Compliance and Intelligent Information Management with Effective Database Management


Data breach is a very real problem in business today. Every day, organizations store massive amounts of data inside database tables—data ranging from credit card transactions to product inventories. This valuable information is what runs the business. In order to protect this data and stay on top of compliance, an enterprise data management solution that respects information privacy regulations should be considered.

database encryption   Read More

The CyberAngel: Laptop Recovery and File Encryption All-in-One


Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.

database encryption   Read More

ERP Vendor Lawson Software Extends to IBM's DB2 Universal Database


Lawson Software, a major privately held provider of enterprise resource planning software, today announced the delivery of its enterprise software applications for IBM's DB2 Universal Database. This availability extends Lawson's support of the IBM DB2 Universal Database to encompass IBM Netfinity, RS/6000 and S/390 servers. Support for IBM DB2 on Hewlett Packard and Sun Microsystems server platforms is scheduled for May 2000.

database encryption   Read More