X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 corporate messenger


Tempest Creates a Secure Teapot
Tempest Software has announced the release of TMS (Tempest Messenger System) version 3.1.1. The product allows suppliers and customers to query corporate

corporate messenger  access to the internal corporate network completely. Using TSWEG, the Web server(s) can be placed behind a firewall that allows no incoming connections whatsoever, securing all database connections, passwords, HTML and scripts. At the same time TSWEG allows developers and administrators to distribute incoming traffic across multiple copies of the Web server, which can run on different machines as needed. This leads to the question If the firewall allows no incoming traffic from the TMS server outside

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Talent Management

Talent management solutions encompass all the applications necessary for handling personnel-related tasks for corporate managers and individual employees from the point of hire to the point of retire. This talent management model includes functionality for recruitment and staffing management, personnel management, career development, succession planning, learning management, performance and compensation management, and workforce management and planning. 

Start Now

Documents related to » corporate messenger

Bullet-proofing Instant Messaging


As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk.

corporate messenger   Read More

It’s a Portal...AND It;s a Gateway


AOL has partnered with Gateway to develop a line of Internet-ready Linux desktop appliances based on the Netscape 6 browser.

corporate messenger   Read More

BlackBerry’s Survival Strategy—Enterprise Mobility


At long last, there seems to be some clarity and plausible strategy at the protractedly plagued BlackBerry. The company’s new chairman and interim chief executive officer (CEO) John Chen, the erstwhile CEO of mobility stalwart Sybase (now owned by SAP), recently published an open letter stating that the company is going back to its heritage and roots—“delivering enterprise-grade, end-to-end mobile solutions.” The letter came shortly after he carried out a major executive shakeup.

corporate messenger   Read More

Lucent's Octel for Microsoft Exchange


Lucent's Octel unified messenger uses a text-to-speech conversion engine for transmitting e-mails over a standard telephone line.

corporate messenger   Read More

Case Study: ABB AG


ABB, a specialist in energy and automation technology, needed a business intelligence (BI) and corporate performance management (CPM) solution in order to support varied business needs and processes such as sales control, management reporting, and planning. But the BI software ABB chose couldn’t cope with all the requirements for integrating analysis, planning, and reporting. Learn about the new BI solution ABB deployed.

corporate messenger   Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

corporate messenger   Read More

New-world Value: The Strategic Impact of Business Application Suites in Today’s Corporate Environment


The concepts of return on investment (ROI) and total cost of ownership (TCO) have been used for decades in enterprise evaluations of IT investments, including enterprise resource planning (ERP) systems. However, with the emergence of important new technological advances, executives are now expanding these traditional formulas to account for new opportunities. Learn more about their new methods for measuring ERP value.

corporate messenger   Read More

It’s All about Security: Things to Know Before You Open the Doors to Smartphones and Tablets in Your Enterprise


Mobile devices such as smartphones and tablets may be putting your corporate information at risk. Lost or stolen smartphones that are not password-protected, or information in corporate e-mail or business applications transmitted wirelessly but not encrypted, can all too easily expose confidential corporate data. Download this white paper to learn about key strategies for protecting your enterprise mobile devices and the sensitive data they contain.

corporate messenger   Read More

AMERICAN EXPRESS Selects TRADEX To Build New Business to Business Commerce Network


TRADEX product will simplify the adoption of Internet procurement solutions for American Express corporate customers and their supplier.

corporate messenger   Read More

TEC Corporate Fact Sheet




corporate messenger   Read More