X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 bell karen


Brio Technology Reports Record Second-QuarterEarnings
M2 Presswire - October 22, 1999 - Brio Technology, Inc., (NASDAQ: BRYO) today reported revenues of $30.7 million for its second fiscal 2000 quarter ending

bell karen  new customers, including AT&T, Bell South, IBM, MCI WorldCom, and Yale University. In addition, during the quarter PeopleSoft announced that Brio.Report would be its standard enterprise reporting solution. Brio Enterprise 6.0 also became certified for SAP Business Information Warehouse. Market Impact Brio Technology describes their Brio ONE product as the combination of the strengths of Brio and SQRIBE in business intelligence, enterprise reporting, and enterprise information portal software . Following

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » bell karen

Magic Quadrant for Managed File Transfer


Companies should consider managed file transfer (MFT) suite vendors that meet their tactical and strategic needs. It's all too easy to be reactive and deploy technology that supports only one file transfer protocol and one standard for secure file transfers. It's more prudent to deploy a product that can be easily expanded and upgraded to handle multiple protocols and multiple standards in a well-managed, auditable way.

bell karen  a completed divestiture from Bell Canada). It's a smaller company than its competitors, with fewer than 100 clients and fewer than 30 employees, which raises concerns of viability from some prospects. nuBridges Strengths The company's integrated B2B gateway and MFT suite enable nuBridges to offer common security and communications protocols, trading partner management and packaged integrated processes, such as Payment Card Industry Data Security Standard compliance and CSOS. nuBridges has a strong Read More

The Midsized Company: ERP Revisited


Enterprise resource planning (ERP) is no longer just for giant companies. Time and critical mass have dramatically cut the cost, complexity, and speed to value of ERP solutions. Today’s ERP systems enable companies of every size to maximize speed and flexibility to close the gap in core business processes, and to gain visibility into customer needs and supplier performance.

bell karen  it really be this bell or that whistle? Or will it be real-time –– or near-real-time –– information, one version of the truth flowing everywhere at once? It’s time for you, too, to revisit ERP software –– its cost, its implementation, its best-of-suite capabilities and its time to value. The fact is, you will need an ever-stronger organizational house to weather the winds of change –- and there is just no way to build a safe, secure house without a sturdy ERP foundation. YOU NEED A STRONG Read More

Top Software for Mining Companies


For your own customized comparison reports, select a category below: ERP & CMMS for Mining. EAM for Mining. Accounting Software Systems.

bell karen  Software, Infor, Mapcon Technologies, Bell Business Solutions, TARGIT, IBM, QlikTech International, Oracle—and many more. For your own customized comparison reports , select a category below: ERP & CMMS for Mining EAM for Mining Accounting Software Systems Business Intelligence Systems Save time and energy comparing enterprise software solutions for mining. Get your free, detailed comparison reports today! Sponsored by Solution Minds today! TEC-preferred partner and mining industry solution specialists Read More

Fault Meets Performance -- Comprehensive Infrastructure Management Part 1: The Problem


Customers, suppliers, partners and other business needs dominate IT decision making, so when these business partners complain about slow applications or interminable downloads, IT listens – or else. Catching and correcting the innumerable faults and performance problems that bring down IT environments is more important than ever.

bell karen  of engineering for Technology Concepts/Bell Atlantic, where he led the design and implementation of the SS7 800 Database front-ends, now deployed nationwide. His experience also includes Digital Equipment Corp., where he led the company's first TCP/IP deployment. Fred has taught computer science, statistics and survey research courses at the University of Connecticut, Boston College and Boston University. He frequently speaks at leading networking industry forums, including Networld+Interop, COMDEX, Read More

Cisco Steps into E-Mail Management


SAN JOSE, Calif.--(BUSINESS WIRE)--Dec. 20, 1999-- Cisco Systems, Inc. today announced that its recently released Cisco eMail Manager, an enterprise- and service provider-class solution for managing high volumes of customer inquiries submitted to company mailboxes or to a Web site, has been chosen by brand name companies for inbound e-mail response management.

bell karen  APAC Customer Services, Inc., Bell Atlantic, Lands' End, Lexica LLC, SmarterKids.com and Solipsa. Market Impact One of the driving forces in Internet e-commerce is communication and responsiveness to the end user, or buyer. Strong communication and response time indicate to the buyer that they are valued clients. If a client feels that their needs have been attended to they are far more likely to become a repeat client. The typical Internet vendor response time to a client issue ranges between 24 and 48 Read More

Progress Exchange 2013 Part Two: Will Pacific be Progress Software’s PaaS to Relevance?


By P.J. Jakovljevic (see bio) and Bob Eastman (see bio) Last week in the TEC blog, we discussed Progress Software’s history and current focus. The company has experienced many changes in the last couple of years, including divestiture of some large assets (including Sonic, Actional, and DataXtend), and a new focus. We also mentioned the Progress Exchange 2013 conference earlier this month

bell karen  Exchange 2013 Part Two: Will Pacific be Progress Software’s PaaS to Relevance? By P.J. Jakovljevic ( see bio ) and Bob Eastman ( see bio ) Last week in the TEC blog , we discussed Progress Software’s history and current focus. The company has experienced many changes in the last couple of years, including divestiture of some large assets (including Sonic, Actional, and DataXtend), and a new focus. We also mentioned the Progress Exchange 2013 conference earlier this month, where CEO Phil Pead Read More

Product Lifecycle Management Agility Founded on Innovation


Agile Software recognizes product lifecycle management (PLM) as an emerging business imperative for innovation. Now, Agile has a unique opportunity to leverage its position as the sole PLM vendor of significance to have a pure PLM pedigree.

bell karen  sector, Bayer HealthCare and Bell Sports both spoke of the challenges of getting product to market, the need for shorter product lifecycles, and their visions for implementing Agile PLM within their respective organizations. From the automotive sector, Intier Automotive Seating spoke of its transformation from a company with several diverse purchasing and engineering systems, to a company with a common integrated PLM solution for unifying functional business areas and global sharing of business Read More

Can Technology Make CFO's and Controller's Jobs More Strategic? (Part 2)


Part 1 of this blog series established that by offloading non-essential and non-value-adding routine tasks to third-party business process outsourcing (BPO) specialists, many human resource (HR) and payroll managers are now able to focus more on strategic and more important tasks of managing talent and human capital of the company. The discussion then went into the possible liberation of chief

bell karen  Technology Make CFO's and Controller's Jobs More Strategic? (Part 2) Part 1 of this blog series established that by offloading non-essential and non-value-adding routine tasks to third-party business process outsourcing (BPO ) specialists, many human resource (HR) and payroll managers are now able to focus more on strategic and more important tasks of managing talent and human capital of the company. The discussion then went into the possible liberation of chief financial officers (CFOs) and Read More

CRM Secrets of ROI and TCO


There is a real cost associated with buying and using a customer relationship management (CRM) software system. Licensing, implementation, integration, and adminstration, are just some of the challenges companies face. Learn the secrets of twenty-one experts in CRM, IT, business and management consulting on getting real value from CRM software.

bell karen  TCO,ROI,Bell Rock,Technology,decision,CRM Read More

The Future of Secure Remote Password (SRP) Part Two: Overcoming Obstacles to Success


This article explores the possibilities for the Secure Remote Password (SRP) in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

bell karen  and Michael Merritt of Bell Labs in 1992. A-EKE is an augmented version of EKE B-EKE is the second augmented version of EKE DH-EKE Diffie-Hellman Encrypted Key Exchange SRP is Secure Remote Password SPEKE is Simple Password Exponential Key Exchange ZKPP Zero Knowledge Password Proof Read More

Busting the Myth of Commoditized Software Markets with the New TEC Focus Indicator


The new TEC Focus Indicator is a concrete way to start gauging the real functionality, competitive differentiators, and focus of enterprise software products. Learn how you can use the TEC Focus Indicator for insight into the functional competitive differentiators of particular enterprise software products against what's available on the market.

bell karen  the zones using a bell curve. The Competitive Zone comprises the middle portion where the most common level of support occurs across the market; of course the Industry Average line is normalized at the apex. The Minimal Support and Dominant Zones are at each of the low ends of the curve. We consider that any product providing a level of support below the Minimal Support line only offers the bare essentials, or else is simply not competing for customers that need that sort of functionality. Products that Read More

Customer Relationship Analysis Firm Extends Reach


thinkAnalytics signs a partnering agreement with one of the largest information technology services companies in North America. Why does CGI expect thinkAnalytics’ software to make a difference to its customers?

bell karen  has close ties with Bell Canada through the BCE holding company, which accounts for almost 40% of CGI sales and owns about 45% of CGI. Under the terms of the partnership CGI will deliver consulting services to assist its customers with thinkAnalytics' flagship thinkCRA product. thinkCRA is an integrated suite containing four analytical applications thinkCustomer performs customer segmentation thinkLoyalty predicts churn and attrition thinkProduct provides product and channel analysis and target group Read More

The Future of Secure Remote Password (SRP)


The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Yet the industry de-facto standard remains the password-based authentication scheme. This article explores the possibilities for SRP in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

bell karen  and Michael Merritt of Bell Labs in 1992. A-EKE is an augmented version of EKE B-EKE is the second augmented version of EKE DH-EKE Diffie-Hellman Encrypted Key Exchange SRP is Secure Remote Password SPEKE is Simple Password Exponential Key Exchange ZKPP Zero Knowledge Password Proof Read More

NetSuite Had a Sweet IPO. Now What?


The end of 2007, at least in the space that I cover, has certainly been "the most wonderful time of the year" for one vendor - NetSuite. True, prior to that, Deltek had a decent initial public offering (IPO) , and possibly even more important, a stellar Q3 2007 quarterly report thereafter. However, on December 20, 2007 NetSuite Inc., a vendor of on-demand, integrated business management

bell karen  rang the day's opening bell, joined by NetSuite Founder and Chief Technology Officer (CTO) and Chairman of the Board, Evan Goldberg, and NetSuite chief financial officer (CFO) Jim McGeever. The IPO, which turned out to have garnered $50 million more than that of Salesforce.com of a few years ago, is certainly another indicator of how mainstream the software as a service (SaaS) model has become and what might be in the store for 2008 . Still, it remains to be seen how much this future visibility will help Read More