Home
 > search for

Featured Documents related to »  securities


10 Common Mistakes You May Be Making When You Set User Rights and Securities
Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to

securities  Set User Rights and Securities Whether you are implementing a new enterprise resource planning (ERP) solution in your company or you already have one—but did not pay very much attention to user rights and securities—there are some factors that you need to take into consideration. ERP is a sophisticated system where simple mistakes can cause big problems. It is also an important investment for your company—and you’ll want to make sure users take good advantage of its features. The way user rights Read More

Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » securities


Did Sagent Technology Pull the Old 'Pump and Dump'?
Sagent Technology has been hit with a class action complaint for violation of the Securities Exchange Act of 1934. According to the complaint, company officers

securities  for violation of the Securities Exchange Act of 1934. According to allegations in the complaint, company officers misrepresented Sagent's 1999 and 2000 sales prospects to give them time to sell over $8 million of their own stock. The officers sold their stock at prices as high as $27.875, but after the true revenue projections were revealed, the stock dropped as low as $7-7/32, a decline of more than 70%. Both the Vice President of Sales and the Chief Financial Officer resigned after they received their Read More
Software Technologies Corporation (STC) Prepares to go Public
Enterprise Application Integration vendor Software Technologies Corp. (STC) announced the filing by the company of a Registration Statement with the Securities

securities  Registration Statement with the Securities and Exchanges Commission relating to the proposed initial public offering of up to $100 million of its common stock. STC will use the net proceeds from the proposed offering for general corporate purposes and to repay $10 million under a long-term note. All shares are being sold by the company. STC, located in Monrovia, is a leading provider of e-Business integration software that enables the seamless flow of information within and among enterprises on a global Read More
i2 Bleeds In Shark-Infested Waters
What a difference a year makes. Two months after the Nike debacle, more than a dozen class action lawsuits for securities fraud are now pending in federal and

securities  IT dollars to spend. Securities fraud lawsuits are usually settled out of court for significantly less money than plaintiffs originally demand. Users concerned that litigation costs may be passed on to them in the form of license and service fees can depend on market competition to keep prices in check. Read More
Can You Trust Entrust?
An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.

securities  all purchasers of Entrust securities between April 19, 2000 and July 3, 2000. Ironically, Entrust is an information security vendor that specializes in the kinds of products other businesses use to secure their applications and networks. On July 11, Entrust suffered a prior blow when the law firm of Bernstein Liebhard & Lifshitz, LLP filed a separate class-action lawsuit for the same date, charging violations of the Securities Exchange Act of 1934. The defendants named in the case are three of the Read More
Saudi Arabian Network Security Provokes Local Considerations
Internet security in Saudi Arabia does not go overlooked. Are the Saudis being over zealous and paranoid, or are they practicing smart network security?

securities  Arabian Network Security Provokes Local Considerations Event Summary In The Kingdom of Saudi Arabia, the entire Internet backbone is concealed behind a countrywide firewall that is built on Sun Solaris servers using the freeware proxy server known as Squid. The firewall is located at the King Abdul Aziz University for Science and Technology (KACST). To keep foreign nations from viewing various local Saudi websites, the massive firewall blocks TCP/IP ports 80 and 443 for all connections coming into Read More
People’s Role in Cyber Security: Academics’ Perspective
With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security

securities  Role in Cyber Security: Academics’ Perspective With an aim of emphasizing the role of people in computer and Internet security, the Crucial Cloud Hosting team presents the views of some of the major security specialists from prestigious U.S., U.K., and Australian universities. Read More
Security Begins on Your Desktop
The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them

securities  Begins on Your Desktop IT Management Issue Consider this: If the hard drive on your personal computer failed right now: How long would it take for you to be as productive as you were yesterday? Would any clients be inconvenienced? Would you impact the productivity of others in the company? Are you sure that no one else on your corporate network can access the files on your machine? How about when you connect to the internet from home? From a client's site? Is your company providing the proper Read More
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security

securities  HP, IBM, Intel and Microsoft Create New PC Security Alliance Event Summary On Monday, October 11, Compaq, Hewlett Packard, IBM, Intel and Microsoft announced the launch of a new alliance, the Trusted Computing Platform Alliance . The Alliance has chartered itself with the mission of developing a new hardware and software specification to enable technology companies to use a more trusted and secure personal computer platform based on common standards. Alliance Chairman, David Chan of Hewlett-Packard Read More
Fixing Security Backdoors: Red Hat 1, Microsoft 0
April is the cruelest month for operating system security holes. Red Hat posted a fix within six hours, but Microsoft leaves us… still waiting!

securities  Security Backdoors: Red Hat 1, Microsoft 0 Fixing Security Backdoors: Red Hat 1, Microsoft 0 C. McNulty - May 9, 2000 Event Summary On 25 April 2000, MSNBC reported that Internet Security Solutions had identified a security back door in Red Hat Linux 6.2. The backdoor involves an extra , but undocumented, administrative password that allows users to run rogue programs on a Red Hat server via a Web-based administrator's interface. To its credit, Red Hat responded and posted a fix within six hours Read More
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's

securities  Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step Read More
NextPage Security
Documents provide tangible evidence of decisions and agreements. They contain crucial intellectual capital. And they make key contributions to your brand. As a

securities  Security Documents provide tangible evidence of decisions and agreements. They contain crucial intellectual capital. And they make key contributions to your brand. As a result, your organization invests significant resources to create processes for protecting critical documents and managing associated business risks. That’s why your document security services need to work within your environment to enhance existing security processes and technologies. Read More
Need for Content Security
The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best

securities  for Content Security Need for Content Security If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. eScan is a complete AntiVirus, AntiSpam and Content Security solution that provides proactive protection against Trojan, Worm, Rootkits, Keyloggers, Malware, Spam and Offensive Content. Source : MicroWorld Technologies, Inc. Resources Related to Need for Content Security : Security (Wikipedia) Need for Content Security Content Security is Read More
Standard & Poor's Announces Security Certification
After exposing numerous customers to embarrassing security vulnerabilities, S&P announces a security certification program.

securities  & Poor's Announces Security Certification Standard & Poor's Announces Security Certification L. Taylor - July 31, 2000 Event Summary Earlier this year, some private industry security experts, in conjunction with SecurityFocus.com, identified and exposed the security vulnerabilities on Standard & Poor's Comstock boxes. TEC published the story of this security faux pas earlier this month. After the story was published, Standard & Poor's announced a certification program dubbed Security Circle Read More
Security for Small and Medium Businesses
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the

securities  for Small and Medium Businesses We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others