X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 extranet web


Web Content Management (WCM)
Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet

extranet web  web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Web Content Management (WCM)

Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. 

Evaluate Now

Documents related to » extranet web

Enterprise Content Management: It Is More Than Just Web Content Management


Enterprise content management (ECM) is moving beyond web content management. To meet enterprises' needs, large vendors are introducing scaled down versions, others are integrating ECM with other systems, and all are focusing on key areas.

extranet web  web sites (intranet or extranet). WCM uses extensible markup language (XML), templates, and style sheets for content creation. It is often browser-based, making it user-friendly allowing non-technical employees to contribute web site content. These solutions also have integrated document management (IDM) functionality to organize and manage the documents within the organizations, library services (including check-in/check-out functionality, version control, collaboration, and user or document level Read More

USWEB Weaves Great Quarter, turns up the heat in the Market Place


USWEB/CKS has announced it fourth quarter results. Its performance is on the money, and continues to drive forward as it goes through expansion by mergers and organic growth. The expansion is directed at providing end-to-end services, for which the merger with Whittman-Hart is a key component. For users, this means that USWEB/CKS can address high-end projects and leverage its position as a leading internet creative services provider. However, it faces issues of staff retention and retaining its technology agnostic stance.

extranet web  provider that provides Intranet, Extranet and Web site solutions and services to medium-sized and large companies. The company has brought in a stronger than expected quarter, making total revenues for the year of $511M, and $47M (9.2%)after-tax profit excluding non-cash charges. However, the red ink is still there, since when operational expenses and non-cash charges are included, the company lost $175M for the year, comparing favorably with a loss of $188M on $229M in revenues in 1998 (for comparison, Read More

Application Single-Sign On: Netegrity, Securant, or Evidian?


As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before.

extranet web  order to create comparable extranet user sign-on privileges, require individual set-up by the firewall administrator for each user or user group. As important as firewalls and VPNs are, however, they do not address SSO and 3A capabilities, so cannot be considered as user-friendly portal security solutions by themselves. Recommendations for Vendors    Netegrity, Securant, and Evidian all offer single sign-on solutions that are LDAP compliant. In this regard, they are all equal contenders, and this is Read More

Hannon Hill Corporation


Founded in January 2001, Hannon Hill Corporation delivers content management solutions for managing Internet, intranet, extranet, and portal content. Its solutions are aimed at organizations of all types, including education, energy, healthcare, hospitality, technology, and publishing. Hannon Hill Corporation is based in Atlanta, Georgia (US).

extranet web  for managing Internet, intranet, extranet, and portal content. Its solutions are aimed at organizations of all types, including education, energy, healthcare, hospitality, technology, and publishing. Hannon Hill Corporation is based in Atlanta, Georgia (US). Read More

6 Important Steps to Evaluating a Web Security Solution


Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control.

extranet web  Important Steps to Evaluating a Web Security Solution Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and Read More

GMAC Web-Enables Legacy Data With NEON Systems Shadow Direct


GMAC is pushing for enterprise-wide web enablement of existing IT assets to support customer self-service platforms. NEON Systems’ Shadow Direct product gives them access to legacy ADABAS databases in a real-time Internet environment.

extranet web  Web-Enables Legacy Data With NEON Systems Shadow Direct GMAC Web-Enables Legacy Data With NEON Systems Shadow Direct M. Reed - March 5, 2001 Event Summary GMAC Insurance group, a subsidiary of General Motors Acceptance Corporation (GMAC) was tasked by General Motors Corporation to build a customer service website. This required access to multiple years of legacy data in the ADABAS database system. This case study, provided by the vendor and further researched by TEC, investigates how NEON Systems ' Read More

Centralized Management for UNIX, Linux, Mac, Web, and Database Platforms


Integrating UNIX, Linux, Mac, Web, and database platforms includes securing all systems with the same authentication, authorization, and group policy services you use for Windows. How can this be done, without intrusive reconfiguration of your existing systems, while still providing the necessary granular administrative control? Learn how to leverage a centralized identity management tool leveraged with Active Directory.

extranet web   Read More

Using Web Technology for Competitive Advantage: How Manufacturers Leverage the Web for Internal Efficiency, Enhanced Customer Service, and Increased Sales


Most manufacturing businesses have invested in technology to combat some of their challenges, but primarily to increase efficiency and productivity. However, many have not yet discovered the value of a Web presence—or they use the Web in a very limited way. More than simply serving a marketing role, a Web presence can boost internal efficiency, enhance customer service, and increase sales. Download this white paper to learn more.

extranet web  Web Technology for Competitive Advantage: How Manufacturers Leverage the Web for Internal Efficiency, Enhanced Customer Service, and Increased Sales Most manufacturing businesses have invested in technology to combat some of their challenges, but primarily to increase efficiency and productivity. However, many have not yet discovered the value of a Web presence—or they use the Web in a very limited way. More than simply serving a marketing role, a Web presence can boost internal efficiency, enhance Read More

Business Objects Launches WebIntelligence Extranet


Business Objects, a leading vendor in the business intelligence space, has announced WebIntelligence« Extranet Edition, which has been designed for customers building extranets to link suppliers, customers, and partners with their internal databases.

extranet web  Objects Launches WebIntelligence Extranet Event Summary SAN JOSE, Calif.--(BUSINESS WIRE)--Jan. 19, 2000--Business Objects (NASDAQ: BOBJ), the world's leading provider of e-business intelligence (e-BI) solutions, today announced WebIntelligence Extranet Edition, an advanced version of the company's leading query, reporting, and analysis solution for the internet. WebIntelligence Extranet Edition has been built to take advantage of the tremendous market opportunity with customers building extranets Read More

Bringing Web 2.0 to the Enterprise: Leveraging Social Computing Technologies for ERP Applications


Web 2.0 technologies bring capabilities to business users that were not possible previously. But the strategic value of these capabilities depends on your organization’s business strategy. This white paper describes the business challenges addressed by new Web 2.0 technologies, and ways that organizations can incorporate them to create powerful new business models.

extranet web  Web 2.0 to the Enterprise: Leveraging Social Computing Technologies for ERP Applications Web 2.0 technologies bring capabilities to business users that were not possible previously. But the strategic value of these capabilities depends on your organization’s business strategy. This white paper describes the business challenges addressed by new Web 2.0 technologies, and ways that organizations can incorporate them to create powerful new business models. Read More

Web Application Security: How to Minimize Prevalent Risk of Attacks


Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new precautions with automated detection. Learn more in this primer to Web application security.

extranet web  Application Security: How to Minimize Prevalent Risk of Attacks Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new precautions with automated detection. Learn more in this primer to Web application security. Read More

Protecting Your Network Against the Growing Danger of Web Attacks


Web-borne malware is now more common than malware entering a company through e-mail. The number of Web sites carrying malware increased by 400 percent in 2008. This can cause serious issues for your business. You need to proactively protect your networks both by instituting acceptable usage policies for employee Web usage and by implementing a solution that can effectively combat these malware intrusions. Find out how.

extranet web  Your Network Against the Growing Danger of Web Attacks Protecting Your Network Against the Growing Danger of Web Attacks If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. MessageLabs, now part of Symantec, provides a range of managed services to protect, control, encrypt and archive electronic communications. Listed as a leader in the Gartner Magic Quadrant and many other analyst reports, and with more than 19,000 clients Read More

Web 2.0 -- "Wow!" or "So What?!"


Another buzzword (albeit not another three letter acronym [TLA]) that has slowly (or not) but surely crept into our collective mind is certainly Web 2.0. Although there have been some attempts at defining the term, such as at Wikipedia, ZDNet or TechTarget (and there are also some noble attempts of ZDNet bloggers, such as Richard MacManus or David Berlind), it is most likely that 10 different

extranet web  2.0 -- Wow! or So What?! Another buzzword (albeit not another three letter acronym [TLA] ) that has slowly (or not) but surely crept into our collective mind is certainly Web 2.0 . Although there have been some attempts at defining the term, such as at Wikipedia , ZDNet or TechTarget (and there are also some noble attempts of ZDNet bloggers, such as Richard MacManus or David Berlind ), it is most likely that 10 different folks will provide 10 different interpretations (albeit most of these will Read More

How to Deal with the Top 5 Challenges of Web Analytics


Web analytics has never been an exact science—which can make the process extremely frustrating. How can you be 100 percent certain that the data you’re working with is always accurate? To deal with this and many other questions that will arise, businesses must gain a better understanding of how well their analytics tools work with their existing data integration solutions, and how using testing platforms will help.

extranet web  to Deal with the Top 5 Challenges of Web Analytics Web analytics has never been an exact science—which can make the process extremely frustrating. How can you be 100 percent certain that the data you’re working with is always accurate? To deal with this and many other questions that will arise, businesses must gain a better understanding of how well their analytics tools work with their existing data integration solutions, and how using testing platforms will help. Read More