X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 documentation on jde


No More Mr. Nice Guy With J.D. Edwards
On May 24, J.D. Edwards & Company reported financial results for the second quarter which ended April 30, 2000. Earlier in the same week, J.D. Edwards announced

documentation on jde  More Mr. Nice Guy With J.D. Edwards No More Mr. Nice Guy With J.D. Edwards P.J. Jakovljevic - June 30, 2000 Event Summary On May 24, J.D. Edwards & Company reported financial results for the second quarter ended April 30, 2000. Total revenue for the second quarter of fiscal 2000 was $231.0 million, compared to revenue of $231.6 million in the second quarter of fiscal 1999 (See Figure 1). License fee revenue grew 22% over the same period last year, to $81.7 million. Services revenue was $149.3 million,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Regulatory and Compliance RFI/RFP Template

Design for Compliance, Management of Hazardous and Controlled Substances, Regulatory and Compliance Documentation, Managing Recyclables and Controlled Waste, Product Technology  

Start Now

Documents related to » documentation on jde

Shall Bifurcated Tack Reverse J.D. Edwards’ Bad Spell?


By opting now for a “best of both worlds strategy,” J.D. Edwards might finally have a formula of getting out of the doldrums it has been in for some time. While maintaining product flexibility, it can now provide its own ‘must have’ applications (e.g. SCM and CRM), and offer, through partnerships, the secondarily important bolt-on’s.

documentation on jde   Read More

J.D. Edwards Saved By SCM, Narrowly, And Only For Now


On March 5, J.D. Edwards reported financial results for Q1 2001. Although the company posted a symbolic profit, the revenue decline begs the question why the company seems to be in a doldrums at the same time when its competitors seem to be upbeat.

documentation on jde   Read More

Insights on Trends in Software Development


This TEC podcast features an interview with Jean-Philippe Valois, Azur Group's business development manager, who shares his insights on trends in software development and explains how the company’s innovative, online technology rapidly builds models of custom applications for the cloud.

documentation on jde   Read More

IBM Algo Risk Service on Cloud


IBM’s Algo Risk Service on Cloud is a web-based risk management and reporting service providing a dynamic interface allowing for the performance of on-demand activities. Support tools are available in a standard configuration for a range of analytics, data, and scenarios, but IBM Algo Risk Service on Cloud also offers flexible customization options. In this white paper, read how IBM Algo Risk Service on Cloud brings the front and middle offices together by addressing and meeting the different needs of portfolio and risk managers, traders, and analysts. The adoption of IBM Business Analytics can help businesses outperform competitors: learn about the myriad of features and benefits that can be brought to your organization.

Decision making needs to be supported by real-time, detailed data, which is delivered by IBM’s Algo Risk Service on Cloud. You can be confident in the source and quality of the risk analysis data, as IBM Algo Risk Service on Cloud provides extensive information and increased visibility on all aspects involved in managing risk. Users can perform a variety of comprehensive “what if” scenarios based on real data to assess an operation before it’s executed. IBM takes your data security seriously and offers a multi-level approach to protecting your information through different security and permissions settings on the individual level. Learn about how IBM Algo One Risk and Financial Engineering Workbench can provide a deeper reading of data. Business can be even more successful with the implementation of IBM’s Algo Risk Service on Cloud.

documentation on jde   Read More

Protecting Sensitive Data on Shared Networks: How to Provide Persistent Encryption of Confidential Folders on Corporate Networks


Companies want to manage security risks and encryption to protect data and to comply with industry guidelines. The desire to separate network management from document ownership can create additional security concerns, as IT services are outsourced. To address these issues, you need to ensure your security solution provides visible and on-going encryption of sensitive data files shared on your networks. Learn more.

documentation on jde   Read More

Secure Email on BYOD


Email remains the primary avenue for sensitive data to leave an organization's network. Securing it becomes more challenging with bring-your-own-device (BYOD). Employees use their own devices, with a variety of operating systems, and connect over insecure networks, making data security difficult to achieve. The good news? You can secure email, even on BYOD devices, without the hassles of mobile device management (MDM).

documentation on jde   Read More

Compaq to Halt NT on Alpha Development


Compaq Computer Corp. this week laid off roughly 100 engineers responsible for developing Windows NT/2000 on the Alpha platform, several informed sources said. [Note: Compaq has only discussed the 32-bit version of NT, it is still unclear whether this announcement also affects 64-bit Windows.]

documentation on jde   Read More

NAPM Puts The Spotlight On Change


TEC VP, James F. Dowling is quoted in the National Association of Purchasing Management (NAPM) magazine Purchasing Today on the meaning of “Value”. The quote was in the context of how the understanding of the meanings of words change over time.

documentation on jde   Read More

Hanging on the Telephone: Antivirus Cold-calling Support Scams


Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.

documentation on jde   Read More

Analyst Take on SAPPHIRE 2013


With a very interesting book presentation on "The Human Face of Big Data," announcements on cloud-based solutions, and extensive and intensive discussions regarding the readiness (or not) of HANA for prime-time deployments in the enterprise, the recent SAPPHIRE 2013 conference was full of exciting and interesting developments—though, I must admit, I was disinterested at times by the repetitive

documentation on jde   Read More