X
Browse RFP templates
Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the success of your software selection project.
Browse Now


Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 setgid bit


SGC SuperCert - Automatic 128-bit set-up Encryption & SSL Certificate
thawte's new SGC SuperCert now automatically steps up to 128-bit encryption for certain end users with the Windows 2000 operating system who, in the past, would

setgid bit  SuperCert - Automatic 128-bit set-up Encryption & SSL Certificate thawte's new SGC SuperCert now automatically steps up to 128-bit encryption for certain end users with the Windows 2000 operating system who, in the past, would not receive 128-bit encryption irrespective of the version of Internet Explorer used. The systems affected are those that shipped prior to about March 2001 and did not subsequently have Microsoft's High Encryption pack or Service Pack 2 installed. thawte's SGC SuperCert ensures

Read More


Browse RFP templates

Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the succes of your software selection project.

Browse Now
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » setgid bit

The Incredibly Shrinking Platform--and Price!


The transformation to a new supply chain technology market wave is already occurring. That’s good news for some and bad for others. This article describes the next wave--SmallSmartFast--and its impact on end users and vendors.

setgid bit  waves occur, at the outset, there is never a whole solution , so people have to purchase a cluster of complementary parts to achieve the goal. Always, the solutions never quite catch up before we move on. As implementations role out and technology providers can fill out their solutions, the law of natural selection takes over, with the stronger, adaptable, nimbler and differentiated surviving and replacing. The Recent Technology Waves...Y2K, The Internet, and... In recent history, technology and Read More

Integrated Innovation in Microsoft Dynamics NAV


As one of the very early adopters of Microsoft products and technologies, Microsoft Dynamics NAV continues to use Microsoft products and technologies to help customers increase productivity, collaboration, and business insight. Instead of wasting valuable resources on integration, partners can focus on adding more customers and developing solutions that help small and medium businesses around the world achieve business success.

setgid bit  and Microsoft Project for set-up and project planning. This helps partners increase productivity and reduces customer total-cost-of-ownership. Smart Tags give employees a more effective working environment The tight integration between Microsoft Dynamics NAV and Microsoft Office enables employees to access information that is stored in Microsoft Dynamics NAV without leaving Microsoft Word, Excel or Outlook. Smart Tags functionality provides predefined information such as a name or an address and is Read More

An Unusual Human Capital Management Suspect


With Infor Human Capital Management (HCM) 3.0, Infor has combined transactional and strategic human resources functionality with planned integration to its flagship enterprise resource planning and extensions solutions, so that customers can better align HCM initiatives with overall business strategy.

setgid bit  streamlined, with all information set up in internal systems beforehand to ensure that new hires are productive from the first day. This is often a time-consuming, paper-intensive process which results in low engagement during the early days of employment. In the demonstration, a new recruit in the information technology (IT) department has accepted an offer of employment, and needs to become registered in the company's systems. The HR administrator completes an online job hire wizard in the Read More

Inovis Delves into PIM by Snatching QRS Part Four: Market Impact


While owing to a number of similar products and to former competition between the merging parties this merger has a merit of growth by acquisition in a slow growing (or even declining) EDI-VAN market, the merger of Inovis and QRS may well emphasize some interesting dynamics within the retail market segment.

setgid bit  medium. Despite high initial set-up and value-added service costs, EDI implementations can actually be cost-effective. The advent of web-based EDI connectivity standards, software, and services has lowered entry barriers for many companies that, initially, would not have considered it an option. Thus, many former VAN providers are taking advantage of emerging standards like AS2, RosettaNet, chemical industry data exchange ( CIDX ), and UCCnet, while the emphasis has been moving from mere connectivity to Read More

Vox Populi: Is The Use of Polygraph Testing In Human Resources Ethical or Useful?


If you do a search on the famous phrase “You can’t handle the truth!” from the movie A Few Good Men, you will find it in a list of useless movie quotes. Ironically, it was also voted as the twenty-ninth greatest movie quote of all time by the American Film Institute. My point is that one should be very careful when handling the truth—especially if you’re a human resource (HR

setgid bit   Read More

Dassault Systèmes to Acquire IBM PLM: Big News, but Not a Big Surprise


A few months ago while I was listening to Dassault Systèmes (DS) executives explaining the company’s sales and marketing strategies and achievements, I wondered what the next move might be since I found the relationship between DS and IBM was becoming more delicate than before. My concern was that a very sophisticated approach would be required in order to grow DS’s own sales capability, while

setgid bit  Systèmes to Acquire IBM PLM: Big News, but Not a Big Surprise A few months ago while I was listening to Dassault Systèmes (DS) executives explaining the company’s sales and marketing strategies and achievements, I wondered what the next move might be since I found the relationship between DS and IBM was becoming more delicate than before. My concern was that a very sophisticated approach would be required in order to grow DS’s own sales capability, while keeping the strong and long-time Read More

Trunity: Introduction to an LMS/WCM Software Provider


Learning management systems (LMSs) and Web content management (WCM) systems for corporate or educational environments have a new but not untested contender. Trunity (a combination of the words truth, trust, and community) provides a platform used to collaborate on delivering a significant body of research used by educational institutions. It may be worth a further look and that’s what we at TEC

setgid bit   Read More

Cloud Proponents Unclear on the Meaning of “Legacy"


In reading business software news and articles on a daily basis, and in speaking with software vendors, I have noticed that vendors of cloud-based applications, analysts, as well as other professionals have recently begun referring to all solutions other than cloud-based applications as legacy solutions. Here are a few examples of what I have come across:

setgid bit   Read More

Recognition for IP Telephony Open Source Style


I've seen a lot of press about the open source telephony system, Asterisk. Although I haven't worked in the telephony world for some time, I remember what it was like administering those systems years ago in a midsize company that handled large event ticket sales. We ran some systems on OS/2 and for larger ACD call center requirements, Unix. These were not inexpensive systems. If I go to

setgid bit  that installs as an easy-to-set-up PBX system. Since TEC's current newsletter issue is focusing on telephony issues, I figured I'd post a bit about the open source side. The Asterisk project originates with a company called Digium , which looks like the center of a whirlwind of related activity. IP telephony vendors claim that one of the benefits they offer is a reduction in costs that would normally be incurred from toll services, and this message is frequently targeted toward small and medium businesses Read More

SAP Seeking Cloud Success via SuccessFactors Buy


The 2011 holiday shopping season seems to have arrived a bit sooner for SAP, who forked out US$3.4 billion for SuccessFactors during the first weekend of December 2011 (see SAP’s official press release). Another curiosity of the acquisition is that it took place on Saturday, which hasn’t prevented bloggers and twitterers from swiftly contributing with their off-the-cuff opinions.

setgid bit  can reciprocate with its set of cloud applications, HANA in-memory technology, BusinessObjects analytics, and Sybase mobility platform and applications. Some have expressed surprise at the hefty price tag (but it's SAP’s money, after all, and SAP is not exactly cash-deprived), which hints at a sense of urgency at SAP,  somewhat similar to HP ’s hefty price tag for Autonomy . Some have expressed concerns about SAP now being saddled with a number of disparate technologies and architectures, both Read More

Bonitasoft, Part 2: Interview with Marketing VP Mac McConnell


Part 1 offered some background on Bonitasoft, provider of open source business process management (BPM) software, and highlighted its approach of targeting process owners.To further flesh out Bonitasoft’s value prop, we recently talked to Mac McConnell, Bonitasoft’s vice president of marketing. He is responsible for all aspects of global marketing, including brand awareness, communications, demand

setgid bit  Part 2: Interview with Marketing VP Mac McConnell Part 1 offered some background on Bonitasoft, provider of open source business process management (BPM) software, and highlighted its approach of targeting process owners. To further flesh out Bonitasoft’s value prop, we recently talked to Mac McConnell, Bonitasoft’s vice president of marketing. He is responsible for all aspects of global marketing, including brand awareness, communications, demand and lead generation, and go-to-market Read More

Maximizer CRM Version 11 Highlights


Maximizer probably needs no introduction, but I will do it anyway for people who are not very familiar with the customer relationship management (CRM) space. It was founded in 1987 and is one of the CRM pioneers that created personal information management systems (PIM) and opportunity management systems. The first version of the product (3.0, launched in 1996, one year after the acquisition of

setgid bit  can be used to set-up alerts, send real-time notifications, and e-mails. •  Online campaign manager has the ability to setup campaigns and track metrics from any Web browser, anywhere in the world. •  Wizard-driven dashboards allow users to easily create, modify, and personalize dashboards, and enable them to drill down to granular data. Regarding the mobile version of the product, Maximizer CRM 11 brings a new tabbed interface, supports documents and attachments to e-mails, GPS integration, and ful Read More

INTERAL Maintenance


INTERAL Maintenance is a client/server-based computerized maintenance management system with a 32-bit interface. Developed to fulfill the needs of today's managers, INTERAL Maintenance can help users manage a variety of maintenance information for equipment, buildings, control instruments, and vehicles. It can also help manage financial information related to repairs.

setgid bit   Read More

The CyberAngel: Laptop Recovery and File Encryption All-in-One


Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.

setgid bit  that this can be setup by calling the CyberAngel Security Monitoring Center. Users may want to setup the alerts to be sent to a cell phone as well as a traditional e-mail account, additional notification paths can be added or changed by calling the CyberAngel Security Monitoring Center. If the laptop contains classified information, the alert could be sent to a U.S. Federal Agency's Computer Security Incident Response Center (CSIRC). We tested the port locking feature by inserting a wrong password into Read More