X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 f part 21


Tracing Food Quality and Safety, or We Are What We Eat, After All (Part II)
Part I of this blog post introduced the burning issues of food safety and the ensuing need for traceability. To the end of providing entire food supply chain

f part 21  and European Union (EU) food safety regulations ( as mentioned in Part I ), while providing tools to help users adjust to future requirements. For example, the application can reduce the time needed to prepare for regulatory audits by providing tools to help automate product quality and traceability reporting. It also can help companies quickly provide evidence about product trace lines and history in the event of specific food safety events. Differentiation -- Total Supply Chain Traceability and ERP

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Software Test Tools

Tools exist to support software testing at all stages of a project. Some vendors offer an integrated suite that will support testing and development throughout a project's life, from gathering requirements to supporting the live system. Some vendors concentrate on a single part of that life cycle. The software test tools knowledge base provides functional criteria you might expect from a testing tool, the infrastructure that supports the tool, and an idea of the market position of the vendor.  

Start Now

Documents related to » f part 21

Dynamic Best Practices of Vulnerability Management


Vulnerability management, the discovery of vulnerabilities and assessment of the risk to the network, is a critical part of both the security and business landscape that any company’s security team needs to understand and implement for long-term success. But companies that rely totally on signature-based defenses can be helpless against many threats. Find out how to reduce risks by identifying and eliminating weaknesses.

f part 21   Read More

The Seven Types of Power Problems


Many of the mysteries of equipment failure, downtime, software, and data corruption are the result of a problematic power supply. Compounding the problem is that there is no standardized way to describe power problems. Learn more about common power disturbances, what can cause them, and how to safeguard your critical equipment—all described in Institute of Electrical and Electronics Engineers (IEEE) standard terms.

f part 21   Read More

Choosing a Solution for Web Filtering: Software, Appliance, Managed Service?


There are three types of web security solutions: software-based, appliance-based, and managed services. Each needs to be evaluated against several key buying criteria, including the accuracy of threat protection, ease of installation and use, and total cost of ownership (TCO). Learn about the benefits of each category, and how they deal with all manner of web-borne security threats, including inappropriate use of the Web.

f part 21   Read More

Continuous Data Quality Management: The Cornerstone of Zero-Latency Business Analytics


No matter how well an enterprise implements a CRM, ERP, SCM, Business Intelligence, or Data Warehouse project, poor data quality can destroy its utility and cost real dollars.

f part 21   Read More

Grape Escape 2013: Customer Value a Priority for Both SYSPRO and UNIT4-Part 2


This is part 2 of a 2-part blog post on Grape Escape 2013, with my analyst take on the announcements and conversations with UNIT4 at the recent analyst event in Boston. UNIT4 Representing UNIT4 at the event were two top managers: regular attendee Ton Dobbe, the company’s vice president of product marketing, and Anwen Robinson, managing director in UK and Ireland, who was invited to share

f part 21   Read More

A Case Study and Tutorial in Using IT Knowledge Based Tools Part 2: A Tutorial


This tutorial, part 2 of a two part series on Knowledge Based Selection, demonstrates the selection processes and capabilities of Knowledge Based Selection Methods and Tools. These tools, integrated with business decision making procedures, can arguably reduce selection risk and improve chances for success in IT projects. Given the appalling rate of IT project failures, selection can potentially help reduce risk in some 30% of cases, with an associated estimated cost of about $30B annually to industry according to some sources. In this tutorial, we illustrate a number of the procedures for rapid decision processing through the real-life selection of a PDA device. The process gave confidence to the argument to wait for the solution, while weighing risk against return.

f part 21   Read More

The 'Joy' Of Enterprise Systems Implementations Part 3: Causes of Failures


This part discusses the causes of ill-fated implementation

f part 21   Read More

Exploring Epicor Productivity Pyramid - Part 2


Part 1 of this blog series introduced Epicor Software Corporation’s set of tools called the Epicor Productivity Pyramid. The Pyramid enables one of Epicor’s main business strategies: to extend the value of several of its mature enterprise resource planning (ERP) applications by making enterprise data readily and easily available to all stakeholders. My blog post then zoomed on to the Epicor

f part 21   Read More

The Wizardry of Business Process Management - Part 3


Part 1 of this blog series provided a lengthy discussion about business process management’s (BPM's) necessary parts and parcels, and the software category’s value proposition. At the end of the article, I mentioned my recent attendance of a witty presentation that attempted to explain the essence of BPM via some humor and metaphor of the classic “Wizard of Oz” movie. Namely, on March 23, 2009,

f part 21   Read More

The (NA)Vision of Microsoft Dynamics NAV 2009 - Part 3


Part 1 and Part 2 of this blog series went through the five previous generations of the Microsoft Dynamics NAV (formerly Navision) product. In late 2008, at the European Microsoft Convergence user conference, attendees saw the sixth major release of the product, dubbed Microsoft Dynamics NAV 2009. The product’s subsequent launch in the US was in February 2009 (the replay can be seen here). But

f part 21   Read More