X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 amr jda 2009 results


JDA FOCUS 2010 Impressions - Part 1
Last year I attended the JDA FOCUS 2009 conference to realize that Scottsdale, Arizona-based JDA Software (NASDAQ: JDAS) has become a force to be reckoned

amr jda 2009 results  a vast majority of AMR Research ’s  Top 25 Supply Chain  corporations are i2 users. At i2 Planet user conferences, one could watch these customers’ overwhelming “rocket science” presentations talking about “high risk, high reward multi-year transformation plans.” Yet, most of the complex solutions i2 developed were not applicable to other customers en masse (maybe only to a few other customers at best). The vendor’s employees were largely the folks with unmatched in-depth knowledge of

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

ERP for the Utilities Industry

Utilities (gas, water, electricity, and energy) software is typically built off customer billing systems encompassing a suite of modules covering fleet management, maintenance management, GIS, AMR, financials, and human resources, among others. 

Evaluate Now

Documents related to » amr jda 2009 results

Optiant Going to a (Much) Better Place: Logility - Part 1


The mergers and acquisition (M@A) market seems to be coming back slowly. One evidence of this could be the late-March acquisition of long-struggling inventory optimization (IO) provider Optiant by long well-performing supply chain management (SCM) provider Logility. Now, I certainly wasn’t surprised by Optiant’s acquisition per se. After all, it was only a matter of time

amr jda 2009 results   Read More

The 2009 Handbook of Application Delivery


Application delivery has become a priority for virtually all IT organizations. Unfortunately, the majority still struggle with this highly complex task. This handbook can help you to help become better at application delivery by creating and analyzing a framework that you can customize for use in your environment. It also identifies key criteria that IT organizations can use to evaluate alternative solutions.

amr jda 2009 results   Read More

TEC presents Its 2009 Manufacturing Execution Systems State of the Market Report


Technology Evaluation Centers Inc. (TEC), the leading resource for enterprise software selection, has released a new manufacturing execution systems (MES) state of the market report.

amr jda 2009 results   Read More

New Web Threats in 2009


The new web-borne threats attacking business networks are more intense and sophisticated than ever. Methods using rich media, web 2.0 collaboration tools, and a host of other technologies expose networks to a new breed of web security threats. Find out what the latest web security threats are, including the risks and business impact these threats represent, and understand the advantages of hosted security solutions.

amr jda 2009 results   Read More

i2 Third Quarter Results Are The Usual Story


i2 Technologies completes another stellar quarter. Does success ever become boring?

amr jda 2009 results   Read More

Thriving and Surviving in a Turbulent World Part Two: Planning and Its Results


This article outlines the planning and results of an adaptive management process for manufacturing executives, who employ demand and supply chain planning technology.

amr jda 2009 results   Read More

How to Improve Business Results through Secure Single Sign-on to SAP


On top of the many challenges faced by IT managers today comes yet another challenge: ensuring efficient and secure user access to SAP. Because of the unencrypted communication between users’ workstations and the backend servers, the SAP environment—and the confidential data it stores—become vulnerable. With a secure single sign-on solution to SAP, however, you can significantly improve the security of this environment.

amr jda 2009 results   Read More

Generate Better Leads for Better Sales Results


In the featured white paper generate better leads for better sales results, CSO insights describes how you can produce better quality leads, result...

amr jda 2009 results   Read More

APICS 2009 Convention: Day 3


Today’s general session showcased people from around the world (Mexico, China, Italy, South Africa, Poland, India, Egypt, US, etc.) and their stories about what work in manufacturing and supply chain means to them. The idea behind this was to show us how supply chain concepts are being embraced worldwide—and the presenters did it by showing media clips and images from different continents.

amr jda 2009 results   Read More

APICS 2009 From the Expo Floor: Is S&OP Coming of Age? - Part 4


Part 1 of this series talked about my attendance of the APICS 2009 international conference in Toronto (Canada) in early October. I attended only a few education sessions, and my conference visit focused more on exploring the expo floor and talking to the exhibitors. My overwhelming impression from the conference's expo floor was that its main value proposition this year revolved around the

amr jda 2009 results   Read More