X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 critical path


Critical Path and NETIAN Strike Strategic Messaging Alliance
NETIAN, South Korea’s largest ISP has selected Critical Path’s Inscribe messaging service to meet the demands of South Korea’s explosive e-mail growth. Critical

critical path  Strike Strategic Messaging Alliance Critical Path and NETIAN Strike Strategic Messaging Alliance P. Hayes - July 28, 2000 Event Summary Critical Path Inc., the dominant global provider of Internet messaging and collaboration solutions, has announced that NETIAN, the largest Internet Service Provider (ISP) in South Korea, has chosen Critical Path's InScribe Messaging Server with a Korean language web client interface to power messaging services for 3 million users. Market Impact South Korea is expected to

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Process Outsourcing (BPO)

Business process outsourcing (BPO) services manage critical front- and back-office processes that can include human resources and accounting as well as customer-related services such as contact center services. 

Evaluate Now

Documents related to » critical path

MCI WorldCom and Critical Path Power into Outsourced Messaging


MCI WorldCom and Critical Path plan to offer the following services: Web mail service, starting at $2 per user, per month, POP3 mail service starting at $3.50/user/month, IMAP4 service starting at $5.50/user/month and a Microsoft Exchange collaborative service starting at $12 /user/month with 20MB of disk space.

critical path   Read More

Analysis of Critical Path's Alliance with yesmail.com for Permission Email


In direct correlation to the success of Internet based Permission email, advertising dollars are starting to be redirected from standard advertising companies such as DoubleClick and put to use in the Permission email area.

critical path   Read More

Insight: The Critical Path to Competitive Differentiation for Growing Companies


Insight is the power to see into a given situation. As such, it requires a combination of experience and analytics to enable better decision making. Insight helps small and medium-size businesses (SMBs) uncover opportunities and expose shortcomings, thus establishing the basis for corrective action. Read about continuing on the path toward greater insight and developing a long-term business intelligence (BI) strategy.

critical path   Read More

The Critical Path to Competitive Differentiation for Growing Companies


Today, companies of all sizes are using insight gained from business intelligence and analytics tools to...

critical path   Read More

Kewill Systems


Kewill delivers innovative software for business-critical global supply chain requirements through three product suites: logistics, to support freight forwarding, transport, warehousing, and customs compliance; transportation and shipping, to enable parcel, less than truckload (LTL), truckload (TL), and desktop shipping and export trade compliance; and business-to-business integration, to drive B2B e-commerce, order management, and supply chain integration.

critical path   Read More

A 5-step Telecom Expense Management Strategy


Many businesses today rely on telecom expense management (TEM) for mission-critical functions ranging from sales to service to customer relationship management. But despite its overall importance, nearly one-third of a telecom staff’s time is spent on processing orders and invoices. Maximizing the potential of a telecom system requires a data-driven approach. Find out how Map-To-Win is helping businesses do just that.

critical path   Read More

3 Critical Considerations When Choosing Your SCM Solution


SCM software selection is a tricky and painful activity for most companies. Why? Despite the plethora of solutions currently available, it may be hard to find one that fits a company’s business model. What should companies do to ensure they are well prepared for choosing the best-fit SCM solution? TEC SCM research analyst Phil Reney offers three critical considerations to help companies in search for an SCM solution.

critical path   Read More

The Path to World-class IT Governance: Maturing Your IT Organization to the Next Level


Many IT organizations lack clear well-defined plans that will bring them to mature governance. By focusing on seven key process categories, an organization can determine its governance maturity. A staged approach allows companies to realize rapid time to value by introducing new tools and processes on an incremental basis. As a result, they can avoid an expensive, one-size-fits-all governance solution that may bring failure.

critical path   Read More

Agile Data Masking: Critical to Data Loss Prevention and Threat Reduction


Over the past several years data loss and data leaks have been a regular part of headline news. This surge in data leak activity has prompted many organizations to reevaluate their exposure to data leaks and institute automated, agile approaches to data masking. Well-implemented data masking secures data delivery and enhances compliance and security while accelerating data management processes.

critical path   Read More

Vulnerability Assessment: The Right Tools to Protect Your Critical Data


Vulnerability assessment (VA) has become one of the hottest fields within computer security. VA tools are designed to detect and report on security holes within software applications, allowing organizations to take corrective action—before devastating attacks occur. Indeed, due to reduction in hacker “time to exploit,” along with intense regulatory pressures, the need for reliable VA has never been greater.

critical path   Read More