X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 article on technology


RFID--A New Technology Set to Explode? Part One: RFID Technology
For retailers and the other vertical industries, radio frequency identification (RFID) tags present enormous opportunities to improve supply chain operations

article on technology  -A New Technology Set to Explode? Part One: RFID Technology RFID Technology Supply chain technology has, for some time, been based on the traditional bar-code technology familiar to ordinary shoppers and consumers, but recently the software capability has been expanded to also use radio frequency identification (RFID) technology. While radio ID tag-enabled software is still just a miniscule part of total supply chain management (SCM) providers' revenues, more and more user companies and software

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Recruitment and Staffing

Recruitment and Staffing functionality allows the user to select and hire the right people with the right skill sets, as well as track the information regarding their recruitment for later analysis. It covers criteria such as Organization Structures and Modeling, Corporate Branding, Sourcing, Applicant Tracking, Assessment and Selection, Governance and Compliance, Vendor Management Systems (VMS) Portal, Recruitment Analytics and Reporting, and Product Technology. 

Evaluate Now

Documents related to » article on technology

Globalization Has a Profound Impact on the Supply Chain and Supporting Information Technology


Globalization, the Internet, and demand-driven supply networks are driving technology change. When it comes to supply chain management, globalization has created a need for supply network integration and real time data with event visibility.

article on technology   Read More

Top 5 Trends in HR Technology


Recession or not, innovation in HR technology continues to grow—altering the way people work. While there are many new solutions available, here are a few that we’ll be seeing more of in the year ahead.

article on technology   Read More

TEC's Bob Eastman on Technology Trends at Epicor Insights 2013


Senior supply chain analyst Bob Eastman was at the Epicor Customer Conference, Insights 2013, in Nashville last week. Epicor invited Bob to share his insight into current technology trends in the supply chain space. Check out that conversation on YouTube. In this almost 9-minute video, Bob talks about the acceleration of the business cycle and some of the enabling trends (such as cloud and

article on technology   Read More

Telco Charged with Trickery on Technology


Bell Atlantic is charged with failing to fulfill promises to bring DSL and other high-speed Internet access to the home.

article on technology   Read More

Seagate Technology Refocuses its Software Business


Over the past six months, Seagate Technology has made major moves to refocus their majority-owned subsidiary, Seagate Software, and put all the emphasis on their business intelligence products. These products were acquired in the early to mid-1990's with the purchase of Crystal Computer Services (Crystal Reports), and Holistic Systems (Holos OLAP product). In the meantime, Seagate has divested their network and storage management products to Veritas Software Corporation.

article on technology   Read More

Arxis Technology


is a technology consulting firm specializing in the implementation and support of accounting and business management software. 

article on technology   Read More

Increase Technology Rollout Service Efficiency


When companies have technology rollouts to deploy on a nationwide or global scale, service efficiency is critical. By understanding the details of the Rollout Services Model, they can avoid the potential nightmares of project implementation and increase the chances that projects are completed on time and within budget. Learn how to evaluate a technology rollout company effectively and ensure that you are getting the most efficient and cost-effective implementation system for your technology deployment projects.

article on technology   Read More

Flowring Technology Corp.


Flowring has devoted to BPM total solutions for years. The complete solution underlying the process-orientated information system leads enterprises operation under control in real time and offer approach to run their own business much more efficiency and flexibility. With the most advanced business process management technologies available, Flowring’s BPM solutions give companies the ability to anticipate, react, and execute faster and better than the competition they meet. Flowring now only offers completed BPM product, but also leads enterprise users to experience further e-business concepts composed of Process Thinking, Working Knowledge, Intelligent Workspace, and Process Enterprise. We assist enterprise to rethink their operation analysis and action mode through Process Thinking, and also lead enterprise to apply their accumulated operation intelligence to their business process reengineering. Furthermore, we offer knowledge worker a friendly and intelligent work interface, and create a new generation of process enterprise based on human being as principle.

article on technology   Read More

The Technology Choices


In the battle between Microsoft Business Solutions (MBS) and the UK-based the Sage Group for the small-to-medium enterprise (SME) market segment, technology choices will be a major factor.

article on technology   Read More

Protecting Sensitive Data on Shared Networks: How to Provide Persistent Encryption of Confidential Folders on Corporate Networks


Companies want to manage security risks and encryption to protect data and to comply with industry guidelines. The desire to separate network management from document ownership can create additional security concerns, as IT services are outsourced. To address these issues, you need to ensure your security solution provides visible and on-going encryption of sensitive data files shared on your networks. Learn more.

article on technology   Read More