Home
 > search for

Featured Documents related to » nbsplab computer security



ad
Get Free HR Systems Comparisons

Find the best HR software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » nbsplab computer security


Gates Previews Pen-Based Computer
Microsoft chairman Bill Gates used Comdex to present his next hardware solution, a pen-computing tablet-sized PC code named, amazingly enough, the Tablet PC.

NBSPLAB COMPUTER SECURITY: Gates Previews Pen-Based Computer Gates Previews Pen-Based Computer R. Krause - November 15, 2000 Read Comments R. Krause - November 15, 2000 Event Summary November 13, 2000 Microsoft chairman Bill Gates used his keynote speech at Comdex to unveil a proof of concept system Microsoft calls its Tablet PC . The Tablet is a little over two pounds, and expected to be around the size of a legal pad. Gates apparently believes pad/tablet PCs and pen-based computing are the next big thing(s) in the PC
11/15/2000

What’s Up with Computer Associates?
In a series of radical moves, Computer Associates appears to be trying to re-direct its gargantuan operations. After missing its numbers in the first calendar quarter (CA’s 4th fiscal quarter), its stock was down 59% at one point.

NBSPLAB COMPUTER SECURITY: What’s Up with Computer Associates? What’s Up with Computer Associates? M. Reed - October 24, 2000 Read Comments M. Reed - October 24, 2000 Event Summary In a series of radical moves, Computer Associates (NYSE: CA) appears to be trying to re-direct its gargantuan operations (it is the third largest software firm in the United States, behind Microsoft and Oracle). After missing its numbers in the first calendar quarter (CA s 4th fiscal quarter), its stock was down 59% at one point. Here is a partial
10/24/2000

Geac Computer Corporation: Mastering Growth by Acquisitions
Geac has acquired in excess of 40 companies around the world. Geac's purchase of UK-based ERP software maker JBA International in 1999 has nearly doubled the company's size.

NBSPLAB COMPUTER SECURITY: Geac Computer Corporation: Mastering Growth by Acquisitions Geac Computer Corporation: Mastering Growth by Acquisitions P.J. Jakovljevic - March 1, 2000 Read Comments Vendor Genesis Geac Computer Corporation Limited manufactures, services, and rents systems, hardware, and enterprise applications to large and small organizations worldwide. Geac is the largest Canadian and one of the largest and most successful international software companies. Its solutions are specifically designed for the critical needs
3/1/2000

Computer Associates Goes E-Business in a Big Way
Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. CA has previously failed to make inroads in the consulting arena, and they feel e-business is the way to fix the problem.

NBSPLAB COMPUTER SECURITY: Computer Associates Goes E-Business in a Big Way Computer Associates Goes E-Business in a Big Way M. Reed - April 27, 2000 Read Comments M. Reed - April 27th, 2000 Event Summary Computer Associates announced at their CAWorld conference that e-business is the place to be, and they are re-orienting their company to facilitate it. In addition to product integration with the Jasmine ii product, the acquisition of Sterling Software, and the reorganization of their service and sales staffs, they are focusing on
4/27/2000

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

NBSPLAB COMPUTER SECURITY: Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance L. Taylor - October 13, 1999 Read Comments Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted
10/13/1999

Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake
Dell Computer Corp. chairman Michael Dell said Thursday the company's financial performance should not be affected by September's earthquake in Taiwan.

NBSPLAB COMPUTER SECURITY: Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake R. Krause - October 13, 1999 Read Comments Dell Uses its Muscle to Beat Side-Effects of Taiwan Quake R.A. Krause - October 15th, 1999 Event Summary October 7, 1999[Reuters] -- Dell Computer Corp. chairman Michael Dell said the company s financial performance should not be affected by an earthquake that knocked out industrial production in Taiwan last month. He said Taiwanese computer parts
10/13/1999

Patni Computer Systems Limited


NBSPLAB COMPUTER SECURITY: Located in Andheri, Mumbia (India), Patni Computer Systems Limited, is a global service provider, servicing Global 2000 clients in the insurance, banking and financial services, manufacturing, telecom, and the vertical and technology areas of product engineering independent software vendors.

Intel Invests in eSoft - Lintel Continues to Grow
Intel has invested in eSoft, a maker of Linux-based servers for small businesses, the chip giant's fourth Linux investment. Intel will help the company develop software for Linux servers designed to be used on the Internet.

NBSPLAB COMPUTER SECURITY: Intel Invests in eSoft - Lintel Continues to Grow Intel Invests in eSoft - Lintel Continues to Grow R. Krause - November 17, 1999 Read Comments Event Summary November 16,1999 [CNET News.com]LAS VEGAS--Intel has invested in eSoft, a maker of Linux-based servers for small businesses, the chip giant s fourth Linux investment. The amount of the investment was not disclosed. Under a deal with Intel also announced today, Intel will help the company develop software for Linux servers designed to be used on
11/17/1999

Debunking the Myths Surrounding Computer-based Scheduling
To expedite planning production, many companies have gone the way of integration with a manufacturing resource planning (MRP) or enterprise resource planning (ERP) system. Although these systems have paved the way in planning production, they can leave a lot to be desired. Learn how manufacturing production scheduling (MPS) can be enhanced by finite scheduling and advanced planning and scheduling (APS) systems.

NBSPLAB COMPUTER SECURITY:
3/2/2010 9:22:00 AM

Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough
Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to learn how a collaborative approach to endpoint security can help ensure that your security solution is both comprehensive and effective.

NBSPLAB COMPUTER SECURITY: Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough Developing a Collaborative Endpoint Security Solution: Why Perimeter Security Is Not Enough Source: Dell KACE Document Type: White Paper Description: Information security is more than just a technology. Two other areas also require consideration: processes and people. Each element is a critical point of the information security triangle, and a change in one area affects the other two. Download this white paper to
5/25/2012 9:50:00 AM

How MWL Fights E-threats
When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and acts as an interface between your computer and the Net, it cannot distinguish the difference between good traffic and bad. MicroWorld Winsock Layer (MWL) technology helps by sitting on the Winsock layer and analyzing the traffic—before it gets to your computer.

NBSPLAB COMPUTER SECURITY: How MWL Fights E-threats How MWL Fights E-threats Source: MicroWorld Technologies, Inc. Document Type: White Paper Description: When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and acts as an interface between your computer and the Net, it cannot distinguish the difference between good traffic and bad. MicroWorld Winsock Layer (MWL) technology helps by sitting on the Winsock layer and analyzing the
11/23/2007 12:50:00 AM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others