X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 examples of passive text


Data, Data Everywhere: A Special Report on Managing Information
The quantity of information in the world is soaring. Merely keeping up with, and storing new information is difficult enough. Analyzing it, to spot patterns and

examples of passive text  deluge also poses risks. Examples abound of databases being stolen: disks full of social-security data go missing, laptops loaded with tax records are left in taxis, credit-card numbers are stolen from online retailers. The result is privacy breaches, identity theft and fraud. Privacy infringements are also possible even without such foul play: witness the periodic fusses when Facebook or Google unexpectedly change the privacy settings on their online social networks, causing members to reveal personal

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Learning Management Suite (LMS)

These are tools for managing, creating, scheduling training or learning in your organization. The terminology varies from vendor to vendor. Learning management systems (LMS) typically help to manage both classroom and on-line learning. They do not normally include content creation or management tools but may in some cases. Some LMSs may manage just classroom or just e-learning rather than both. Some LMSs may also include content authoring and managment and virtual classrooms. Learning content management systems (LCMS) emphasize the management of content for courses/training/learning. In most cases, they include content authoring tools. In some cases, they may also include some of the features of LMSs. Content authoring tools are often provided as part of an LCMS. They may also be stand-alone products. Virtual classrooms (web conferencing tools) normally are separate third party offerings but may be included as part of a suite of tools. Suites of tools include features of at least two or more of the above categories. While some companies offer just LMS or LCMS systems others offer suites of products, which provide all or most of the features of the other tools. Suites combine several capabilities of learning management--usually two or more of the following: learning management, classroom training management, e-learning management, custom content creation, learning content management, learning object repositories, or virtual classrooms.  

Start Now

Documents related to » examples of passive text

Beware of Vendors Bearing Solutions


Hype has been a major factor in the recent downfall of some of the enterprise application industry's most illustrious players. This article presents some very simple things that you can do to prevent yourself and your company from being tomorrow's lead story in the industry trades.

examples of passive text   Read More

CitiXsys iVend Retail 5.0 for Point-of-sale Retail Certification Report


CitiXsys product iVend Retail is now TEC Certified for online evaluation of point-of-sale (POS) solutions in the Wholesale and Retail Trade Evaluation Center. The certification seal is a valuable indicator for organizations relying on the integrity of TEC research for assistance with their software selection projects. Download this report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

examples of passive text   Read More

Glossary of Enterprise Applications Terminology Part One: Accounts Payable Through Internet


As enterprise applications systems developed over time, a continuous stream of new terminology surfaced. This is a glossary of those terms.

examples of passive text   Read More

Collaboration 2.0: Taking Collaboration to the Next Level: From the E-mail and Document-centric World of 'Enterprise 1.0' to the People-Centric World of Enterprise 2.0


Most business collaboration continues to be conducted via e-mail and shared folders, but forward-looking organizations are increasingly considering socially oriented and real-time collaboration solutions to instantly and seamlessly increase productivity between employees, suppliers, customers, and stakeholders. This white paper discusses new products, services, and technologies entering the enterprise collaboration space.

examples of passive text   Read More

Technology Evaluation Centers Mourns Loss of Chairman, Marcel Côté


It was with great sadness that TEC learned of the death of Marcel Côté, chairman of TEC’s board of directors.

examples of passive text   Read More

Dynamic Best Practices of Vulnerability Management


Vulnerability management, the discovery of vulnerabilities and assessment of the risk to the network, is a critical part of both the security and business landscape that any company’s security team needs to understand and implement for long-term success. But companies that rely totally on signature-based defenses can be helpless against many threats. Find out how to reduce risks by identifying and eliminating weaknesses.

examples of passive text   Read More

Analysis of Active Voice's Acquisition of PhoneSoft, Inc.


Active Voice will integrate all of PhoneSoft's functionality into their existing "Unity" voice-messaging product to target Lotus Notes Domino R5.

examples of passive text   Read More

Wipro Point of View: Changing Nature of the Wealth Management Industry


The slump in the wealth management industry has its roots in the financial crisis in America and Europe. This has led to high-net-worth individuals (HNI) getting increasingly attracted to low risk, low management investments. Dr. Ashok Hegde, Global Head of Financial Services, Business Analyst Practice, Wipro, shares his expertise on the current challenges faced by and opportunities available to wealth managers. Read more.

examples of passive text   Read More

The New Era of Mobile Intelligence: the Convergence of Mobile Computing and Business Intelligence


Computing is entering its fifth generation with desktop Internet applications giving way to a new generation of mobile Internet applications. As consumers capitalize on the power of mobile devices, the same transformation is occurring in business. Learn how the convergence of business information and analytics with mobile technology is empowering business people in a way that was never possible—until now.

examples of passive text   Read More

Threshold of a New TEC Advisor


I'm happy to announce the beta launch of our new tool to help people start their research and evaluations of enterprise software systems. Think of it as the doorway to our TEC Advisor online evaluation and comparison application (accessible from our evaluation centers). In the following, I'll explain what it is and how it works. A few years ago I asked on this blog, "How do you

examples of passive text   Read More