X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 school computer protection


Case Study: Faronics Deep Freeze and Mobile County Public School System
The Mobile County Public School System was frustrated with frequent attacks by viruses and malware on its student and staff workstations. The school district’s

school computer protection  and staff workstations. The school district’s IT department searched for ways to gain more control over the multi-user computer environment. With Faronics’ Deep Freeze servers, IT now has centralized control of workstations, and increased protection against the effects of spyware, malware, and viruses.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

ERP for School Districts

The ERP knowledge base for K-12 school districts and municipalities focuses on back-office functionality, including financials, human resources (HR), and payroll. It covers important functionality for employee self-service activities, purchasing management, and inventory management. 

Evaluate Now

Documents related to » school computer protection

Fighting Cybercrime on the Internet


Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

school computer protection   Read More

ToolsGroup-Going Back to Its SCP Roots


What has ToolsGroup, the expert in demand-driven SCP, been doing to address demand and supply variability? Read P.J. Jakovljevic’s article and see how ToolsGroup has developed sophisticated software that analyzes demand history across multiple dimensions, enabling companies to obtain more accurate forecasts and inventory targets for driving outstanding customer-service levels with less global inventory in their supply chains.

school computer protection   Read More

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

school computer protection   Read More

Are Your Company Laptops Truly Secure?


The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.

school computer protection   Read More

Ficus Computer Engineering, Inc.


Ficus Computer Engineering provides consulting services in the field of Web-enabled applications, e-commerce solutions, and Palm applications.

school computer protection   Read More

Trend Virus Control System - A Centralized Approach to Protection


Trend Virus Control System (TVCS) utilizes a web based management console, which allows for administration, configuration and policy enforcement from a central location.

school computer protection   Read More

Affordable Content Filtering for any Business, School, or Library


For today’s organizations, Internet access is a must-have. However, when they decide to open the door to the World Wide Web, the good—along with the bad—enters the network. Spyware and viruses can be distributed onto the network from untrustworthy web sites. In order to protect the best interests of the organization, an effective Web content filter is required.

school computer protection   Read More

Trend Micro Anti-Virus Server for Microsoft Exchange ~ A Secure Choice For Enterprise Wide Anti Virus Protection.


Some of the more widely known viruses, such as the "Melissa" virus or the new Seinfeld based "BubbleBoy" virus can be sanitized and/or deleted, not only at the heuristic macro level, but also through using basic ASCII text content filtering.

school computer protection   Read More

Geac Computer Corporation: Mastering Growth by Acquisitions


Geac has acquired in excess of 40 companies around the world. Geac's purchase of UK-based ERP software maker JBA International in 1999 has nearly doubled the company's size.

school computer protection   Read More

Raising the Bar on Mobile Workforce Security with Integrated Data Protection and Strong Authentication


The growing adoption of laptops and other portable devices is changing the foundation of traveling and telecommuting. Laptops have overtaken desktops as the computer of choice for business users. While endpoint protection has been traditionally associated with solutions like antivirus and firewalls, these technologies don’t adequately protect data against theft, loss or unauthorized access. Learn more. Download this white paper now.

school computer protection   Read More