X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 door telelogic


Why Systems Fail - The Dead-end of Dirty Data
If your data does not reflect reality, the system can never be effective. In today’s world of collaboration, showing a trading partner dirty data is giving them

door telelogic  you open your collaboration door, the trading partner sees the inside of your company good or bad. Internal problems can quickly become external problems. Perhaps worse, if you convert dirty data to be used with a new system, what happens? You will have problems with the new system but it will be very difficult to determine the cause of the problems, the dirty data or the system itself. What can we do about dirty data? We need to be on the lookout for dirty data. When it is detected, we need to both fix

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » door telelogic

Business Basics: Unscrubbed Data Is Poisonous Data


Most business software system changes falter--if not fail--because of only a few root causes. Data quality is one of these root causes. The cost of high data quality is low, and the short- and long-term benefits are great.

door telelogic   Read More

In Conversation with Rootstock Management


TEC’s recent article Rootstock Software Steps Out on Force.com outlined the genesis of Rootstock Software and its cloud-based ERP offering. Rootstock Software and FinancialForce.com (a joint venture between UNIT4 and salesforce.com) announced a partnership earlier in the year to deliver a comprehensive manufacturing and accounting solution on Force.com. Rootstock is vying for its ERP solution to

door telelogic   Read More

Informix XML’s Its Metadata Transport Layer


Informix® Corporation, has announced an XML Document Type Definition (DTD) for Extraction, Transformation, and Transport (ETT) of metadata. The DTD is designed to allow metadata sharing between different vendors’ products using the open XML standard.

door telelogic   Read More

Can Your Product Development Move Closer to Consumers Now?


Half a year ago, I wrote about the need to include customer input in the design process in What Brings Customers Closer to Your Product Development? Recently, two pieces of Web content caught my attention and made me revisit this topic. The first one, The Path to Successful New Products, from the recent issue of McKinsey Quarterly, outlined three principles of making product development more

door telelogic   Read More

Network Associates Hopes to Rekindle the Flame


Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to be down for the count. Year 2000 will be a better year. The momentum of the market will add enough spark to NAI's new corporate strategy to ignite a profitability flame and help it regain its stance.

door telelogic   Read More

CIOs Need to Be Held Accountable for Security


As systems, networks, and websites suffer new magnitudes of Denial of Service attacks, malicious network scans, and network intrusions, organizational CIOs need to be held accountable for information security.

door telelogic   Read More

Businesses in Motion: SAP HANA + Microsoft Kinect, and More


A recent note that landed on my plate really grabbed my attention: As part of a long partnership, Microsoft and SAP jointly gave a demo in which Microsoft Kinect was used to exploit SAP’s HANA capabilities. Seeing data being managed by a motion-based device made me want to write a post speculating about the way users and computers will interact in the future. First: Is it too early

door telelogic   Read More

Integrated EAM for Hotels: An Overview


According to a recent NYT article, the hotel industry saw record revenue last year reaching $138 billion, growing $28 billion from the previous year. In response, hotels increased rates and major chains like Hyatt and Marriott began planning new hotels. While the recent subprime crisis, low US dollar, and high gas prices have caused these chains to scale back new developments, they have not

door telelogic   Read More

Sales Tax Audit Survival Guide


Find out in the practical survival guide. managing transaction tax audit risk.

door telelogic   Read More

iPad, Fashion PLM, and the Connection Between Fashion Designers and Customers


I recently had the opportunity to meet with Centric Software and get to know more about Centric 8 Product Lifecycle Management (PLM) and Sourcing Solutions for the fashion industry. Among the interesting topics discussed, a recently launched product called Collection Book for Fashion iPad app was most impressive. In my view, this iPad app is a great product, as it takes advantage of the user

door telelogic   Read More