Featured Documents related to
10 Common Mistakes You May Be Making When You Set User Rights and Securities
Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to
Set User Rights and Securities Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to user rights and securities—there are some factors that you need to take into consideration. ERP is a sophisticated system where simple mistakes can cause big problems. It is also an important investment for your company—and you’ll want to make sure users take good advantage of its features. The way user rights
Discrete Enterprise Resource Planning (Discrete ERP) RFI / RFP Template
Financials, Human Resources, Manufacturing Management, Inventory Management, Purchasing Management, Quality Management, Sales Management, Product Technology
Get this template
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Did Sagent Technology Pull the Old 'Pump and Dump'?
Sagent Technology has been hit with a class action complaint for violation of the Securities Exchange Act of 1934. According to the complaint, company officers
for violation of the Securities Exchange Act of 1934. According to allegations in the complaint, company officers misrepresented Sagent's 1999 and 2000 sales prospects to give them time to sell over $8 million of their own stock. The officers sold their stock at prices as high as $27.875, but after the true revenue projections were revealed, the stock dropped as low as $7-7/32, a decline of more than 70%. Both the Vice President of Sales and the Chief Financial Officer resigned after they received their
Software Technologies Corporation (STC) Prepares to go Public
Enterprise Application Integration vendor Software Technologies Corp. (STC) announced the filing by the company of a Registration Statement with the Securities
Registration Statement with the Securities and Exchanges Commission relating to the proposed initial public offering of up to $100 million of its common stock. STC will use the net proceeds from the proposed offering for general corporate purposes and to repay $10 million under a long-term note. All shares are being sold by the company. STC, located in Monrovia, is a leading provider of e-Business integration software that enables the seamless flow of information within and among enterprises on a global
i2 Bleeds In Shark-Infested Waters
What a difference a year makes. Two months after the Nike debacle, more than a dozen class action lawsuits for securities fraud are now pending in federal and
IT dollars to spend. Securities fraud lawsuits are usually settled out of court for significantly less money than plaintiffs originally demand. Users concerned that litigation costs may be passed on to them in the form of license and service fees can depend on market competition to keep prices in check.
Can You Trust Entrust?
An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.
all purchasers of Entrust securities between April 19, 2000 and July 3, 2000. Ironically, Entrust is an information security vendor that specializes in the kinds of products other businesses use to secure their applications and networks. On July 11, Entrust suffered a prior blow when the law firm of Bernstein Liebhard & Lifshitz, LLP filed a separate class-action lawsuit for the same date, charging violations of the Securities Exchange Act of 1934. The defendants named in the case are three of the
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?
Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into
People’s Role in Cyber Security: Academics’ Perspective
With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security
Role in Cyber Security: Academics’ Perspective With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities.
Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them
Begins on Your Desktop IT Management Issue Consider this: If the hard drive on your personal computer failed right now: How long would it take for you to be as productive as you were yesterday? Would any clients be inconvenienced? Would you impact the productivity of others in the company? Are you sure that no one else on your corporate network can access the files on your machine? How about when you connect to the internet from home? From a client's site? Is your company providing the proper
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security
HP, IBM, Intel and Microsoft Create New PC Security Alliance Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard
Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!
Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's
Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step
Documents provide tangible evidence of decisions and agreements. They contain crucial intellectual capital. And they make key contributions to your brand. As a
Security Documents provide tangible evidence of decisions and agreements. They contain crucial intellectual capital. And they make key contributions to your brand. As a result, your organization invests significant resources to create processes for protecting critical documents and managing associated business risks. That’s why your document security services need to work within your environment to enhance existing security processes and technologies.
Need for Content Security
The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best
for Content Security Need for Content Security If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. eScan is a complete AntiVirus, AntiSpam and Content Security solution that provides proactive protection against Trojan, Worm, Rootkits, Keyloggers, Malware, Spam and Offensive Content. Source : MicroWorld Technologies, Inc. Resources Related to Need for Content Security : Security (Wikipedia) Need for Content Security Content Security is
Standard & Poor's Announces Security Certification
After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.
& Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle
Security for Small and Medium Businesses
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the
for Small and Medium Businesses We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus
The Future of Talent Management: Underlying Drivers of Change
Driving HR Forward: A Practical Guide for Making the Shift from Administrator to Strategic Advisor
Coupa: Spend Management Software Leader or Challenger?
University and Student Programs
Meet TEC's Experts
Software Evaluation Reports
Features and Functions
Interactive Case Studies
News and Press Releases
TEC Case Studies
Working at TEC
White Paper Newsletters