Home
 > search for

Featured Documents related to »  application programming


Mobile Application Momentum
With the boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications is ever more appealing. But the market is

application programming  Software Applications | Mobile Application Programming | Mobile Bluetooth Applications | Mobile Application Development Tool | Mobile Application Ideas | Developing Windows Mobile Applications | Best Way to Create a Mobile Apps | Marketing Mobile Apps | Linux Apps | Developing Compelling Applications | Mobile Users Device | Varied Input Options for Mobile Device | Mobile Apps Quocirca Research | Mobile Map Service | Individual Application for Mobile Devices | Platform Options for Developers | Mobile Read More
Outsourcing, Applications Software
This RFP is focused on the selection of companies who provide outsource services in the areas of application software. The typical types of activities that these outsource providers perform include...
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » application programming


Is Your Enterprise Application on a Road to Nowhere?
Consolidation is a well-documented trend and is to be expected in the market for enterprise applications. This article outlines the evolution of the enterprise

application programming  what extent is this application built with industry-standard technologies, including Java and .NET? Proprietary programming languages, middleware, and development tools will be harder to support as the market evolves away from them. Questions for Unified Technology Companies Unified technology companies provide enterprise applications based on a single integrated platform. Examples include SAP and IFS. Here are key questions to ask unified technology companies: How can this application be evolved to meet Read More
Enterprise Application Provider May Deepen Market Impact
The worst is past for SoftBrands. However, the vendor must still deal with the problem of blending many formerly independent organizations together, while

application programming  its classic Fourth Shift application and evolution. Given the apparent refocusing and transfer of the sales force to the SAP Business One edition, the vendor will have to tread carefully so as to not disconcert users of the original Fourth Shift. This is especially true in light of the fact that this product's recurring revenue remains a major chunk of the company's revenue. At the very least, SoftBrands should clarify for both existing and prospective users the functional, technological, and pricing Read More
The Application Server War Escalates
At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the

application programming  the release of Oracle's application server, Oracle 9iAS . The purpose of the JavaOne conference was to extol the virtues of the Java programming language, its ROI for business, and its speed of implementation. This keynote speech indicated that there is more to the application server war than meets the eye. The keynote started off innocuously enough, with BEA CEO Coleman speaking about BEA's future proof concept of development. Coleman discussed at length the wonders of J2EE (Java 2 Enterprise Read More
The Many Flavors of Application Software Outsourcing
Many companies are looking to outsource development and maintenance of their application software. Common reasons that companies outsource application software

application programming  Many Flavors of Application Software Outsourcing Defining the Problem In the 1990s many companies rushed to upgrade or replace their legacy software prior to January 1, 2000—affectionately known forevermore as Y2K. There was fear and concern that many legacy software applications would be unable to handle the requirements of a change in the first two digits of a four-digit year in date fields. A large number of companies chose to purchase and implement new software packages that handled most of Read More
Web Application Security: How to Minimize Prevalent Risk of Attacks
Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of

application programming  Application Security: How to Minimize Prevalent Risk of Attacks Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new precautions with automated detection. Learn more in this primer to Web application security. Read More
ezONE Smart Enterprise Suites and vertical application suites including RFID
The company@s flagship product is the ezONE Smart Enterprise Suites (ezONE SES). The ezONE product series consists of the core platform, based on J2EE (Java

application programming  Enterprise Suites and vertical application suites including RFID The company’s flagship product is the ezONE Smart Enterprise Suites (ezONE SES). The ezONE product series consists of the core platform, based on J2EE (Java EE), and several vertical application suites. The core platform is scalable and provides the integration infrastructure for the ‘ez’ vertical application suites. The vertical suites consist of six main modules, which can work together, or separately. The ezCMS is a content Read More
Datawarehouse Vendors Moving Towards Application Suites
During September, two more data warehousing vendors announced product suites that they claim offer broader integration between different data warehousing

application programming  Vendors Moving Towards Application Suites Event Summary During September, two more data warehousing vendors announced product suites that they claim offer broader integration between business intelligence, data movement, data cleansing and metadata management. BI vendor Cognos (NASDAQ: COGN) announced Cognos platform , a tool to build complete BI-ready data infrastructures . Data Movement vendor Ardent Software (NASDAQ: ARDT) announced DataStage XE , which is designed to simplify Read More
How to Optimize Application Integration in Manufacturing
Data integration is a key enabler for supply chain modernization. Competition is driving increased integration of the supply chain, both due to direct cost

application programming  to Optimize Application Integration in Manufacturing Data integration is a key enabler for supply chain modernization. Competition is driving increased integration of the supply chain, both due to direct cost pressures and to increased globalization. There can be little doubt that well implemented supply chain integration saves labor costs and improves inventory control. This has often been a complex and costly proposition. Standards, improved products and a common understanding of best practices for Read More
Application Single-Sign On: Netegrity, Securant, or Evidian?
As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is

application programming  Netegrity, Securant, or Evidian? Application Single-Sign On: Netegrity, Securant, or Evidian? Featured Author - Laura Taylor - December 22, 2001 Introduction    With the proliferation of web-based technologies, single sign-on has emerged as an important and central architecture solution for enterprise applications. As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before. Read More
The Hidden Gems of the Enterprise Application Space
Given ever-shorter product life cycles and companies' ever-increasing reliance on third parties to increase customer satisfaction, the need for some form of

application programming  Gems of the Enterprise Application Space Emergence of SRM The evolving supplier relationship management (SRM) market and its ever-evolving or emerging constituent parts like e-procurement, strategic sourcing, spend analysis and so on have lately shown great opportunities to the pure-play SRM vendors with genuine value prepositions. These have been seen in increased user awareness and adoption, certain venture capital investments in these days of scarce capital outside the trendy biotechnology sector, whic Read More
Solver’s Collaborative BI360 Business Intelligence Application Is Now a TEC Certified Solution
We are pleased to announce that the business intelligence (BI) and analytics product BI360 by Solver is now part of TEC’s certified BI applications family of

application programming  Collaborative BI360 Business Intelligence Application Is Now a TEC Certified Solution We are pleased to announce that the business intelligence (BI) and analytics product BI360 by Solver is now part of TEC’s certified BI applications family of products, and is available for evaluation online in the Business Intelligence and Data Management Evaluation Center . In a matter of just a couple of weeks, I’ll be providing a full certification report, where I will review the main features of BI360, Read More
Application Modernization with SOA
Systems integration with service-oriented architecture (SOA) helps you reuse the functionality in your mainframe applications. Extending your mainframes to an

application programming  Modernization with SOA Systems integration with service-oriented architecture (SOA) helps you reuse the functionality in your mainframe applications. Extending your mainframes to an SOA through Web services will accelerate your time to market, keep your costs low, and help you avoid undue risk. Keep your business dynamic and current, and stay competitive in today’s marketplace—modernize your existing mainframes with SOA. Read More
Quote-to-Order: An Overlooked Software Application
Last year, I met an analyst from another firm, and asked him what he thought about quote-to-order (Q2O) solutions, given the relevance between Q2O and the

application programming  to-Order: An Overlooked Software Application Last year, I met an analyst from another firm, and asked him what he thought about quote-to-order (Q2O) solutions, given the relevance between Q2O and the conference that I was attending. Not quite surprisingly, the answer I got was, “this kind of application doesn’t have a future.” The conversation didn’t go any further due to limited time but I could imagine that his reasoning might have sounded like this: even though activities from quoting to Read More
Should You Modify an Application Product?
When it comes to modifications to an application product, there is the good, the bad, and the ugly. Enter the modification process cautiously, with your eyes

application programming  You Modify an Application Product? Should You Modify an Application Product?   It would be nice if off-the-shelf application products would satisfy every business need of every business. However, be it SCM, ERP, CRM, BI or any other category of application products, this is not the way it is. Many businesses find that some needs are unmet; they cannot live with a plain vanilla version of the product. If that is your situation, should you modify the package to meet those needs? Is the pain worth the Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others