X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cursor pointers


e-Business Service Provider Evaluation & Selection
This is a transcript of an audio conference on E-Business Service Provider Evaluation and Selection presented by TechnologyEvaluation.Com. The presentation used

cursor pointers  Business Service Provider Evaluation & Selection e-Business E. Robins - August 10, 2000 Introduction Good morning everyone, my name is Dr. Eddie Robins and I am TechnologyEvaluation.com's Chief Scientist. I head up the E-Commerce Service Provider research area. This morning we're going to discuss a proven, best of breed methodology for evaluating and selecting a Digital Business Service Provider (DBSP). During the presentation, we will use TechnologyEvaluation.Com's patented online selection engine,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » cursor pointers

Maintenance Software--Plan Ahead to Maximize CMMS Vendor Web Site Visits


For those looking for a computer maintenance management system (CMMS) vendor, the Web is often the first place to start. There are a number of web site features one should examine in order to maximize web site visits. Reprinted with permission from Plant Engineering and Maintenance magazine.

cursor pointers   Read More

25% Less Learning Time? Find the Right Approach to Training


A key challenge in software implementation is getting the end users up to speed with a new system. Training just doesn’t seem to work—or is not fast enough. But what if you could learn how to use a new software in 25% less time, using a method has been around for more than half a century? Find out why the Training Within Industry (TWI) approach works, and how you can use it today to swiftly train your people to use new software.

cursor pointers   Read More

Enterprise Messaging Evaluation and Procurement Audio Transcript


This is a transcript of an audio conference on Enterprise Messaging Evaluation and Procurement presented by TechnologyEvaluation.Com. The presentation used the TEC patented selection engine WebTESS to conduct a live real time evaluation and selection. It then reviewed the critical differentiating messaging criteria, as well as detailed comparisons of competing vendors such as Microsoft, Lotus, and Novell.

cursor pointers   Read More

Economic Benefits of PLM-enabled Collaboration


Many of today’s product lifecycle management (PLM)-enabling technologies allow complex information to be shared by dispersed teams of people. Product data management (PDM) technology is used to organize and provide access to your intellectual assets. PLM, its collaborative Product Definition management (cPDm) capabilities, and other solutions can help you go beyond asynchronous data sharing. Find out how.

cursor pointers   Read More

Configuration Guide: Managing Virtual Servers Using a Virtual Machine Manager and a Clustered File System


Virtual data centers must enable increased physical server use and central management of virtual machine infrastructure. A clustered file system, with a virtual machine manager (VMM), can add critical new management and migration capability to current virtual servers. Before installing and configuring VMM, find out the hardware and software required for migration and integration, and helpful “how-to” pointers.

cursor pointers   Read More

The Changing Requirements of WAN Optimization


Companies looking to drive greater IT performance will do well to begin their search with Wide Area Network (WAN) optimization, which has evolved into a complete system that provides deep, actionable visibility. Read on to learn how WAN optimization works across the broad range of applications that enterprises use the most, and get pointers for what to look for in a measurement tool in a WAN optimized environment. Read more.

cursor pointers   Read More

Freeware Vendor's Web Tracking Draws Curses


The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was discovered and announced by the same security consultant who discovered, in March of 1999, that Microsoft Windows was inserting unique serial numbers into many documents created within Office 97 programs like Word and Excel.

cursor pointers   Read More

Challenges of the Future: The Rebirth of Small Independent Retail in America


By any measure, retailers are overwhelming small businesses. More than 95 percent of all retailers have only one store. Almost 90 percent have sales less than $2.5 million (USD), and more than 98 percent have fewer than 100 employees. To compete, small businesses need to be innovative, and understand both personalization and value, and how to execute best practices to build success.

cursor pointers   Read More

I Know What You Did Last Week - But I'll Never Tell


Internet advertising is under attack from privacy advocates and private citizens as DoubleClick reveals that it can correlate surfing behavior with individual identities. DoubleClick points out that this is only possible when the personal identification is provided voluntarily. Opponents question whether the average surfer understands the implications of providing information.

cursor pointers   Read More

IBM & ILOG Matrimony: Good for BPM, Uncertain for SCM? -- Part 3


Part 2 of this blog topic continued to analyze IBM’s rationale behind acquiring ILOG to bolster its service oriented architecture (SOA) and business process management (BPM) platforms, in part due to the capabilities of archrival Oracle. What About ILOG's SCM Products? Whether as a sort of “collateral damage” (given IBM’s foremost interest in beefing up its SOA/BPM infrastructure product) or

cursor pointers   Read More