X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 hacking navision


Microsoft Business Network (MBN)--Coming of Age? Part Three: Challenges and Competition
While on the surface, there are few economic or strategic reasons for organizations to persist with electronic data interchange (EDI), many seem reluctant to

hacking navision  Business Network (MBN)--Coming of Age? Part Three: Challenges and Competition Challenges At the end of March, during its annual conference for North American customers, Convergence 2004 , Microsoft Corporation 's (NASDAQ: MSFT) Microsoft Business Solutions ( MBS ) division previewed upcoming versions of its enterprise resource planning (ERP) and customer relationship management (CRM) solutions: MBS Axapta , MBS Great Plains , MBS Navision , MBS Solomon , Microsoft CRM , and related services. The

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » hacking navision

Microsoft’s Underlying Platform Parts for Enterprise Applications: Somewhat Explained - Part 1


I can partly understand analysts’ temptation to beat up on Microsoft’s forays into the enterprise applications space. To be fair, "the empire" has had its share of strategic and tactical miscues, as if it had wanted to give these naysayers some ammunition. For one, many analysts and market observers first criticized the giant for not having a unified enterprise resource planning (ERP) product line

hacking navision   Read More

The (NA)Vision of Microsoft Dynamics NAV 2009 - Part 2


Part 1 of this blog series went through the first three generations of the Microsoft Dynamics NAV product, which at the time was called Navision and was owned by the formerly independent namesake company. How has new parent Microsoft treated the product since acquiring it in 2002? Well, ongoing feedback from customers, partners, and market observers shows that Microsoft Dynamics NAV

hacking navision   Read More

Managing Your Supply Chain Using Microsoft Navision


This is a reprint of the summary chapter from the book Managing Your Supply Chain Using Microsoft Navision by Dr. Scott Hamilton.

hacking navision   Read More

Kewill And Microsoft Great Plains To Further Mutually Complement


While Microsoft Great Plains and Kewill will offer a potentially awesome combined offering worldwide, their competitors will bet on products that cover all the bases in a natively integrated fashion.

hacking navision   Read More

Microsoft to Add "Encore" Functionality to MBS Great Plains 8.0 Part Three: Challenges and User Recommendations


MBS' current strategy of letting extension functionality proliferate spontaneously largely resembles the current development practice of the open source community. This can be be considered ironic, because open sourcing is something Microsoft loves to hate.

hacking navision   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

hacking navision   Read More

How Secure is Your E-Mail?


A party interested in viewing point to point e-mail can visit one of numerous news groups and hacking web sites for a full instruction set and tools to read your mail

hacking navision   Read More

Will Solomon Finally Satisfy Great Plains’ Insatiable Appetite?


Great Plains announced it intends to significantly expand its mid market e-business community through the acquisition of Solomon Software, its direct competitor. The combined company will have more than 130,000 customers, 2,200 team members and a worldwide network of 2,000 channel partners.

hacking navision   Read More

Not Your Mother’s Portal


Radnet’s PortalworkX™ provides an elegant solution to a class of problems you knew you had, but thought you’d have to solve by hacking up other products that do something different. The keyword is collaboration.

hacking navision   Read More

Global versus Local Channel Approach, Who Will Win?


There is a clear distinction between the market dynamics within the respective MBS and Sage/Best channels.

hacking navision   Read More