X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cursor pointers


e-Business Service Provider Evaluation & Selection
This is a transcript of an audio conference on E-Business Service Provider Evaluation and Selection presented by TechnologyEvaluation.Com. The presentation used

cursor pointers  Business Service Provider Evaluation & Selection e-Business E. Robins - August 10, 2000 Introduction Good morning everyone, my name is Dr. Eddie Robins and I am TechnologyEvaluation.com's Chief Scientist. I head up the E-Commerce Service Provider research area. This morning we're going to discuss a proven, best of breed methodology for evaluating and selecting a Digital Business Service Provider (DBSP). During the presentation, we will use TechnologyEvaluation.Com's patented online selection engine,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » cursor pointers

Maintenance Software--Plan Ahead to Maximize CMMS Vendor Web Site Visits


For those looking for a computer maintenance management system (CMMS) vendor, the Web is often the first place to start. There are a number of web site features one should examine in order to maximize web site visits. Reprinted with permission from Plant Engineering and Maintenance magazine.

cursor pointers  as you move the cursor over the main headings. One interesting feature that has become quite popular on CMMS web sites is a ticker-tape window that provides eye-catching news, such as a recent strategic alliance, record earnings for the quarter or a new customer. By double-clicking, you can get more details on any of these items. Some web sites have click-boxes that provide full audio or video clips from a user conference or speech from a key executive. At the bottom of the opening screen, almost all web Read More

25% Less Learning Time? Find the Right Approach to Training


A key challenge in software implementation is getting the end users up to speed with a new system. Training just doesn’t seem to work—or is not fast enough. But what if you could learn how to use a new software in 25% less time, using a method has been around for more than half a century? Find out why the Training Within Industry (TWI) approach works, and how you can use it today to swiftly train your people to use new software.

cursor pointers  following where the teacher’s cursor is. If you are not familiar with the task, then you don’t know what fields matter, and where they are located on the screen. By doing repeated demonstrations (four) and layering on new information each time, the learner gets familiar with where to move his/her eyes on the screen, and doesn’t get overwhelmed with information all at once. The “bite-size” pieces of information make it easier to swallow. Learners repeat the process Too often people learning Read More

Enterprise Messaging Evaluation and Procurement Audio Transcript


This is a transcript of an audio conference on Enterprise Messaging Evaluation and Procurement presented by TechnologyEvaluation.Com. The presentation used the TEC patented selection engine WebTESS to conduct a live real time evaluation and selection. It then reviewed the critical differentiating messaging criteria, as well as detailed comparisons of competing vendors such as Microsoft, Lotus, and Novell.

cursor pointers  Messaging Evaluation and Procurement Audio Transcript Enterprise Messaging Evaluation and Procurement Audio Transcript P. Hayes - July 7, 2000 Event Summary This is a transcript of an audio conference on Enterprise Messaging evaluation and procurement conducted on May 2, 2000. Overview Hello, my name is Patrick Hayes and I head-up the messaging and wireless research areas for TechnologyEvaluation.Com. This morning we are going to discuss a proven, best of breed methodology for evaluating and Read More

Economic Benefits of PLM-enabled Collaboration


Many of today’s product lifecycle management (PLM)-enabling technologies allow complex information to be shared by dispersed teams of people. Product data management (PDM) technology is used to organize and provide access to your intellectual assets. PLM, its collaborative Product Definition management (cPDm) capabilities, and other solutions can help you go beyond asynchronous data sharing. Find out how.

cursor pointers  PTC,change management,pdm,design review,product lifecycle management,change management process,change management software,cad system,cad systems,pdmworks,plm software,product data management,software design review,change managment,design software reviews Read More

Configuration Guide: Managing Virtual Servers Using a Virtual Machine Manager and a Clustered File System


Virtual data centers must enable increased physical server use and central management of virtual machine infrastructure. A clustered file system, with a virtual machine manager (VMM), can add critical new management and migration capability to current virtual servers. Before installing and configuring VMM, find out the hardware and software required for migration and integration, and helpful “how-to” pointers.

cursor pointers   Read More

The Changing Requirements of WAN Optimization


Companies looking to drive greater IT performance will do well to begin their search with Wide Area Network (WAN) optimization, which has evolved into a complete system that provides deep, actionable visibility. Read on to learn how WAN optimization works across the broad range of applications that enterprises use the most, and get pointers for what to look for in a measurement tool in a WAN optimized environment. Read more.

cursor pointers  Changing Requirements of WAN Optimization Companies looking to drive greater IT performance will do well to begin their search with Wide Area Network (WAN) optimization, which has evolved into a complete system that provides deep, actionable visibility. Read on to learn how WAN optimization works across the broad range of applications that enterprises use the most, and get pointers for what to look for in a measurement tool in a WAN optimized environment. Read more. Read More

Freeware Vendor's Web Tracking Draws Curses


The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was discovered and announced by the same security consultant who discovered, in March of 1999, that Microsoft Windows was inserting unique serial numbers into many documents created within Office 97 programs like Word and Excel.

cursor pointers  that can convert your cursor into an animated shape of your choosing when you surf the Web, has been collecting information about where the estimated six to fourteen million users of the Comet Cursor point their browsers. The discovery was made by a private security consultant, Richard Smith, a founder of Phar Lap Software, who was also responsible for revealing security problems in Windows and for independently tracking down the Melissa virus. Comet uses a unique serial number for each user to that they Read More

Challenges of the Future: The Rebirth of Small Independent Retail in America


By any measure, retailers are overwhelming small businesses. More than 95 percent of all retailers have only one store. Almost 90 percent have sales less than $2.5 million (USD), and more than 98 percent have fewer than 100 employees. To compete, small businesses need to be innovative, and understand both personalization and value, and how to execute best practices to build success.

cursor pointers  retail chain,dynamics retail,entire retail landscape,existing retail types,key retail,leading retail,network retail,retail companies,retail consulting trade,retail decisions,retail distribution Read More

I Know What You Did Last Week - But I'll Never Tell


Internet advertising is under attack from privacy advocates and private citizens as DoubleClick reveals that it can correlate surfing behavior with individual identities. DoubleClick points out that this is only possible when the personal identification is provided voluntarily. Opponents question whether the average surfer understands the implications of providing information.

cursor pointers  provider of a configurable cursor that changes as users surf the web, contained information that identified the individual user's machine. Comet immediately rewrites their software to eliminate the problem. CBS' 60 minutes runs a segment on Internet privacy issues. December, 1999 Richard Smith finds that many popular email systems allow senders of bulk commercial email to track the surfing behavior of people who merely read the email. January, 2000 President Clinton uses his State of the Union message to Read More

IBM & ILOG Matrimony: Good for BPM, Uncertain for SCM? -- Part 3


Part 2 of this blog topic continued to analyze IBM’s rationale behind acquiring ILOG to bolster its service oriented architecture (SOA) and business process management (BPM) platforms, in part due to the capabilities of archrival Oracle. What About ILOG's SCM Products? Whether as a sort of “collateral damage” (given IBM’s foremost interest in beefing up its SOA/BPM infrastructure product) or

cursor pointers  & ILOG Matrimony: Good for BPM, Uncertain for SCM? -- Part 3 Part 2 of this blog topic continued to analyze IBM ’s rationale behind acquiring ILOG to bolster its service oriented architecture (SOA) and business process management (BPM) platforms, in part due to the capabilities of archrival Oracle . What About ILOG's SCM Products? Whether as a sort of “collateral damage” (given IBM’s foremost interest in beefing up its SOA/BPM infrastructure product) or maybe not, the acquisition also leaves Read More

Supply Chain Management Audio Conference Transcript


This is a transcript of an audio conference on Supply Chain Management presented by TechnologyEvaluation.Com. The presentation used the TEC patented selection engine WebTESS, to conduct a live real time evaluation and selection. It then reviewed the critical differentiating supply chain management criteria, as well as detailed comparisons of i2 Technologies, Manugistics, Aspen Technology, Logility, and Adexa.

cursor pointers  Resource Chain Voyager, a precursor to the current applications was installed at client sites as early as 1996. Logility Challenges Building the foundations under its castles: Logility has invested heavily in its move toward application hosting, a market that can have considerable impact on its future livelihood. Though its applications possess attributes that make them well-suited to Internet deployment (e.g., configurable product, mid market focus, CPFR), Logility will need to make considerable Read More

Discovering and Creating Value in Procurement through Continuous Assessment and Innovation


Improvement is not simply an idea: it is a process. And processes without frameworks are recipes for underachievement, or worse, chaos. For this reason, value leakages in procurement functions must be resolved in a systematic, progressive, incremental, and formalized manner.

cursor pointers  and Creating Value in Procurement through Continuous Assessment and Innovation Introduction About a decade ago, the procurement function was viewed primarily as a cost centre and a routine operation. More recently, it has been considered as a revenue-generating centre because of value-adds in the function. The procurement function now plays a key role in terms of improving the organization's performance, and any improvement in procurement operations can bring tremendous results in a firm's Read More

Security for Small and Medium Businesses


We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from

cursor pointers   Read More

Seeing through the Fog: Managing Application Performance in the Cloud


Much of a network professional’s time is spent in the weeds—fixing what breaks and trying to keep infrastructure humming so users don’t call the help desk. Climbing out of the weeds to take in the big picture and lay the groundwork for better future performance seems a luxury. This report introduces best practices for improving the performance of mission-critical networked applications and provides pointers for what to look for in a measurement tool in a WAN-optimized environment.

cursor pointers  through the Fog: Managing Application Performance in the Cloud Much of a network professional’s time is spent in the weeds—fixing what breaks and trying to keep infrastructure humming so users don’t call the help desk. Climbing out of the weeds to take in the big picture and lay the groundwork for better future performance seems a luxury. This report introduces best practices for improving the performance of mission-critical networked applications and provides pointers for what to look for in Read More