X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 context magazine


Ramco Lands a Major Cloud ERP-EAM Deal in Australasia
Norske Skog signs an agreement with Ramco Systems to replace its existing enterprise asset management (EAM) and & financials systems with Ramco ERP on Cloud

context magazine  on mobility, usability, and context-aware solutions was the winning factors.   The year 2013-14 has seemingly been a defining year at Ramco, as the company strengthened its foothold in the global markets by signing large multinationals, Fortune 500 companies, and fast-growing mid-sized organizations as clients. From being seen predominantly as a domestic-led organization, Ramco today clocks around 69 percent of its overall revenues from markets outside India as compared to 47 percent last fiscal year.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » context magazine

Channels to the Hearts and Minds--On-line 2005


The physical, e and wireless world continues to grow! The e channel for shoppers continues to grow, with so many nay-sayers and doubters. You'd think this issue would die, with more and more shoppers buying from far flung vendors: Boston to the Nanga Tribes for buying original crafts; Dallas to Huangshan City, China, etc.

context magazine   Read More

The Middle Kingdom - From Wired to Wireless


Confused about RFID middleware? RFID middleware has a critical role to play in cleaving together and clarifying the signals and intelligence, bidirectionally from the device layer to the business applications, or out to the communications infrastructure, to the web or satellites. This article explains it all.

context magazine   Read More

Supply Chain Economy


The US Labor Department reported an increase in jobs in June and July ... but the manufacturing industry cut jobs for a third month in a row. We are moving from a manufacturing economy to a supply chain economy. This article gives the big picture.

context magazine   Read More

Demystifying the EPC Global Network: An explanation of ONS, EPC-IS, and EPC-DS


As goods traverse the supply chain, various parties need to exchange information about these goods. This requires interoperability across the global network, creating the need for the EPCglobal Network.

context magazine   Read More

Customer Relationship Management (CRM)


When talking about relationship management in the context of software solutions, most people think of customer relationship management (CRM). However, relationships also exist between companies and their vendors, companies and their customers, vendors and their suppliers, employees, different departments of the same company, and so on. The Relationship Management Evaluation Center concentrates on CRM and supplier relationship management (SRM), as software and information and communication technology (ICT) play a major role in facilitating effective relationship management among all parties involved.

context magazine   Read More

Turn Identity into a Business Enabler, Not an IT Bottleneck


This paper will examine identity and context as they relate to your identity management (IdM) infrastructure, and it will also look at how delivering identity and context as a service can help jumpstart—or extend—your identity management efforts, offering you actionable insight into your most valuable resource: your employees, partners, and customers.

context magazine   Read More

IFS Bucking the Trends - Part 2


Part 1 of this blog series analyzed the current upbeat state of affairs of IFS, a public business software company (listed on the Stockholm Stock Exchange) founded in 1983 with its headquarters in Linkoping, Sweden. The company develops, supplies, and implements IFS Applications™, an integrated and component-based extended enterprise resource planning (ERP) suite built on

context magazine   Read More

Accept Software Corporation


Accept Corporation (Accept) was founded in 2004 specifically to solve the challenges of software release planning and portfolio planning in the context of management of market elements such as customer and product requirements, markets and customers, and business and product strategies. Today, Accept delivers The Product Innovation Management solution that companies use to decide which products to bring to market for the fastest time-to-profit. The Accept360 Suite is a complete end-to-end solution that links strategy and decisions from ideation through portfolio planning, roadmaps, requirements and execution.

context magazine   Read More

Digital Dashboard Tip Sheet


This tip sheet lists some of the general principles you should follow when creating an information dashboard for your company. These include sticking to actionable information, providing context for that information, and arranging everything to fit in a one-page display.

context magazine   Read More

IronPort’s Multilayer Spam Defense Architectural Overview


Earlier-generation spam systems all share a common weakness—they rely heavily on analyzing content that can easily be manipulated by spammers. As such, state-of-the-art antispam systems must go beyond content examination by analyzing messages in the full context in which they are sent. Find out how using a multilayer defense approach can help you successfully eliminate spam and blended threats in your enterprise.

context magazine   Read More