X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 e part 15


New Dimensions in EC and SCM Part 1: The Benefits of E-Procurement
From point-and-click ordering using Web-based catalogs of individual suppliers, to marketplaces that bring together in one place the products or services

e part 15  site in five parts. Each part will contain links to the preceding parts. Part 2 will discuss the potential Efficiency Gains of e-procurement, including relationships and processes that are necessary to obtain these gains. Part 3 will discuss how e-procurement can Broaden the Supplier Pool and the pros and cons of this approach to procurement. Part 4 will discuss using e-procurement to Leverage Volume, including leveraging volume through outsourcing. Part 5 will discuss how e-procurement can Improve

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Learning Management Suite (LMS)

These are tools for managing, creating, scheduling training or learning in your organization. The terminology varies from vendor to vendor. Learning management systems (LMS) typically help to manage both classroom and on-line learning. They do not normally include content creation or management tools but may in some cases. Some LMSs may manage just classroom or just e-learning rather than both. Some LMSs may also include content authoring and managment and virtual classrooms. Learning content management systems (LCMS) emphasize the management of content for courses/training/learning. In most cases, they include content authoring tools. In some cases, they may also include some of the features of LMSs. Content authoring tools are often provided as part of an LCMS. They may also be stand-alone products. Virtual classrooms (web conferencing tools) normally are separate third party offerings but may be included as part of a suite of tools. Suites of tools include features of at least two or more of the above categories. While some companies offer just LMS or LCMS systems others offer suites of products, which provide all or most of the features of the other tools. Suites combine several capabilities of learning management--usually two or more of the following: learning management, classroom training management, e-learning management, custom content creation, learning content management, learning object repositories, or virtual classrooms.  

Evaluate Now

Documents related to » e part 15

Who's Who? Sorting Out the e-Logistics Players Part 3: New Solutions


There is a wide range of new 'e-gistics' players emerging to address today’s transportation and logistics challenges, and different solutions will be appropriate for different kinds of situations.

e part 15   Read More

The ERP Market 2001 And Beyond - Part 5: Recommendations


Winning ERP products will demonstrate deep industry functionality and tight integration with best-of-bread ‘bolt-on’ products in a particular vertical. Users should focus on the handful of business objectives they need to achieve and the ways to measure their success.

e part 15   Read More

Stalled Oracle Fumbling For A Jump-Start Kit Part 2: Event Summary Continued


Oracle continues respond to the changing requirements of the market, by addressing the need for Wireless Internet support, application servers, and expanded ASP support, while using new pricing models to maintain and expand its existing customer base.

e part 15   Read More

New Dimensions in EC and SCM Part 4: Using E-Procurement to Leverage Volume


A straightforward way to drive prices down and obtain increased supplier attention is to leverage total purchasing volume through Internet-based auctions. This part addresses the implications of using e-procurement to Leverage Volume, including leveraging volume through outsourcing.

e part 15   Read More

Deltek's Second Bite at the IPO Cherry (Part IV)


Part III of this blog series analyzed the relatively recently launched Deltek Vision 5 [evaluate this product] and Deltek Costpoint 6 [evaluate this product] suites. It also tackled the related potential opportunities for Deltek. For one, key up- and cross-sell opportunities should come from: Additional modules, especially from the newly minted Deltek EPM [evaluate this product] suite: The

e part 15   Read More

Current E-business Trends


E-business is more than a smart Web presence or a slick, flash-driven shopping cart. But thanks to astounding hype-over-Internet, droves of large and medium enterprises were woefully late in realizing the need for a sensible strategy deployment. By now, however, they have realized that e-business initiatives have to cohere strongly with overall business strategy. Yes, right, sounds good, but how?

e part 15   Read More

Oracle E-Business Suite (12.1) for Financial Packages Certification Report


Oracle E-Business Suite (12.1) is now TEC Certified for online comparison of financial packages in TEC's Evaluation Centers. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

e part 15   Read More

IronPort E-mail Authentication


Most spam, viruses, phishing, and e-mail denial-of-service attacks can be traced back to a single common cause: lack of e-mail protocol authentication. This lack of authentication means that a receiving mail server cannot reliably verify that a particular message is in fact from the sender it claims to be from, making it harder to distinguish friend from foe. Find out more about new standards that can help.

e part 15   Read More

UNIT4: The (Largely) Untold Story - Part 3


Part 1 of this blog post series started with my invitation by UNIT4 (formerly Unit 4 Agresso), the second largest business applications provider in continental Europe, to attend its UK 2010 users conference. Frankly, I was a bit skeptical about what new and exciting I might see and hear about at this event in light of the vendor’s analyst tour in Boston in late 2009. The

e part 15   Read More

Building an ROI Model to Evaluate Your B2B E-commerce Initiative


B2B companies everywhere are under heavy pressure to offer their customers and employees robust e-commerce capabilities that rival best-of-breed consumer-focused companies. B2B companies that fall short of customer expectations risk losing them to competitors who have stepped up their game. This paper provides a framework for building an ROI model that can be used to demonstrate the advantages of a new e-commerce implementation to senior executives and board members.

e part 15   Read More