TechnologyEvaluation.Com
NEWSLETTER
January 21, 2002  Volume 3, Issue 524
 


Headline News

SAP To Take Care Of All Suppliers
by P.J. Jakovljevic
While SAP's delivery of the first major product, supplier relationship management (SRM), based on its recently unveiled open technology platform, one should by no means expect painless business partners' enablement effort.

 


Advertise with Us

Contact Us

ERP Is A Popular Topic

Check out the articles in our ERP Research Channel.

To help you understand all that ERP stuff, read:

ERP Beginner's Guide In So Many Words

 

Today's Newsletter is sponsored by J.D. Edwards

The Customer Is Always Right
So You Need To Be Right About Your Customers

J.D. Edwards Customer Lifecycle Management solutions expand the definition of CRM to include all of the business processes and associated systems that touch a customer.

Our collaborative commerce CRM solution is a customer-oriented, B2B solution for optimizing your planning, marketing, sales, fulfillment, delivery, and service. It recognizes that billing and delivery are every bit as important as sales force automation in terms of the overall customer experience.

To view a demo of our Customer Management Lifecycle,
please click here.
 

 
 
 


Today's TEC Analysis
 
Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards
by Laura Taylor
Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.


 

 

 
 
Technology Notes

User-Focused Design Principles Shape the Customer Experience
by Michael Ryan
Welcome to the customer experience. We all have them. Some are good, others bad. A variety of factors - the user interface (UI), customer support, marketing messages, etc. - shape these experiences. All of these things collectively create our view of a product, service or provider.

 

 

 
 

Tell a Friend about us and get a FREE download of Copernic Shopper, the key to smart online shopping!

Click here for your FREE SOFTWARE
 
 

 
 

TEC Favorites

Lawson Software Braves IPO And Reports Strongly Against The Odds

 


Thank you for reading TechnologyEvaluation.com's Newsletter, ISSN#1527-957X.
Copyright 2001 TechnologyEvaluation.Com, Inc. All rights reserved
You are receiving this mail because you have subscribed to TechnologyEvaluation.com and requested access to the TechnologyEvaluation.com newsletter.

To unsubscribe, please visit the URL below:
http://www.technologyevaluation.com/u.asp?e=