X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 james goodnight


Glovia Confirms the Potential of Its G2 ERP at User Conference
Recently I was kindly invited to attend the Glovia G2 user conference, hosted by Glovia, a subsidiary of Fujitsu, in Las Vegas, Nevada.The event wasn’t

james goodnight  and longer-term task that James Gorham, executive vice president of Glovia International, mentioned is to reach a point of software maturity and standard functionality available where all unique customer-specific requirements can be accommodated through regular system features, or via a flexible user interface with special fine-tuning tools, thus eliminating the need for custom code amendments. Since Glovia has already significantly reduced the number of modifications requested by its clients, this task

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » james goodnight

Team With Business Management to Drive Out IT Cost


IT complexity drives cost and to a great extent, it is business management that drives IT complexity. Until IT architecture and infrastructure are simplified and configured into an adaptable platform, system design and construction will be fraught with wasteful work and non-essential components.

james goodnight  in a column by James F. Dowling in Mid - Range Computing . Look for other previously published Mid - Range Computing columns by Mr. Dowling at this site or visit Midrange Showcase at www.midrangecomputing.com/showcase/. Information Technology Aligned with Business   Every business manager knows that duplication of work or resources increases operating costs. At the highest level of business operation, companies are buying each other in a frenzy to combine sales forces, share manufacturing capacity and Read More

Best of breed versus Suite Anti-spyware


The anti-spyware industry is going in two separate directions. First, there are suite products that come with other security applications, along with anti-spyware. Second, there are best-of-breed products that are purely focused on detecting and eradicating spyware. Depending on the type of organization, choosing a suite-based anti-spyware over best-of-breed software can leave a company vulnerable.

james goodnight  named a “Modern Day James Bond” by the media. He obtained this status by identifying common trends in the way information and computer systems are compromised. He did this by performing penetration tests, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these penetration tests, as well as assisting Read More

Lean Maintenance: Best Practices to Turn Asset Management into a Profit Center


It’s common knowledge that asset downtime disrupts production and drives up both process and per-unit operating costs. However, executives often lose sight of this because they focus on output, not on the assets used to create it. The irony is that companies can use asset performance management not only to make more widgets, but to make each widget more profitably.

james goodnight  toward refined leanness. Dr. James Womack, founder of the Lean Enterprise Institute, further refined leanness in his books The Machine That Changed the World (Macmillan/Rawson Associates, 1990), Lean Thinking (Simon & Schuster, 1996), Seeing The Whole: mapping the extended value stream (Lean Enterprise Institute, 2001), Lean Solutions (Simon & Schuster, 2005). From Franklin through Womack to today's business environment, the idea of leanness has been applied to a greater or lesser degree to all business Read More

Mercator Continues to Suffer Turmoil - Can They Stay on the Map?


What’s new at EAI vendor Mercator Software? TEC updates a report from August 2000. Mercator Software has found themselves on a long and rocky road, where the bumps have included loss or reassignment of most of their executive management team, a precipitous drop in market capitalization, and an uncertain future. On the upside, Mercator has announced a 50% increase in revenue for October and November 2000 compared to the same period in 1999, and also announced a major sale to Amazon.com.

james goodnight  and Africa), and Asia/Pacific. James P. Schadt, the company's chairman, has been named as interim CEO until a successor to Galley can be found. On a more positive note, the vendor has announced that for the quarter to date through November, the company has booked over $18 million in revenue. This is approximately a 50% increase over the same two-month period in 1999. In addition, Mercator announced that Amazon.com has selected them as a key technology for Supply Chain Integration, specifically in the Read More

Rich Internet Applications (RIA): Opportunities and Challenges for Enterprises


Rich Internet applications (RIAs) represent the next wave in the evolution of web applications, as they promise the richness, interactivity, and usability lacking in many of today’s web applications. However, as with any technological innovation, with the new opportunities come new challenges to be negotiated. What are the business benefits of adopting RIA, and what are the risks?

james goodnight  term coined by Jesse James Garatte1, is an amalgamation of several existing technologies like XHTML, CSS, DOM, XML, XSLT, XMLHttpRequest, and JavaScript. At the heart of any Ajax implementation is the XMLHttpRequest JavaScript object, which drives asynchronous communication between the client and the server. In Flash-based RIAs, Flash Player acts as a virtual machine that renders flash content to users. Presentation servers like Flex and Open Laszlo2 reside on the server and provide a platform to develop Read More

Licking Desktop Problems


Like the old tootsie pop ads that ask how many licks it takes to get to the center, how many annoyances does it take to get people and businesses to change desktop operating systems? Aside from the frequent crunch of bloggers discussing their switch from Windows to Linux, we're still waiting to find out. In the news this week, Microsoft annoyed a number of admins with its Windows Desktop

james goodnight  example, Vista deactivation. Columnist James Bannan described the experience this week. Put simply, your copy of Windows will stop working with very little notice (three days) and your PC will go into reduced functionality mode, where you can't do anything but use the web browser for half an hour. You'll then need to reapply to Microsoft to get a new activation code. Sounds like an invitation for extra work without any beneficial return on that work. I presume that's part of the reason demand for the Read More

10 Strategies for Choosing a Mid-market ERP Solution


For a midsized company, finding the right enterprise resource planning (ERP) system is a tall order—but that’s not always a bad thing. Now, big-name vendors are aiming their solutions at small and midsized companies. With a little savvy, you can make this new market dynamic work to your advantage. Leverage the new realities of mid-market ERP by bearing in mind 10 strategies when shopping for an ERP solution. Learn more.

james goodnight  smaller, midsized company, said James Norwood, Epicor Software's vice president of product marketing. Norwood points to the company's Epicor Information Worker (IW) as a product tailored for midsized companies, since the solution packs basic CRM and ERP functionality along with supplychain management functions and presence technology — all of which can be accessed via Microsoft Outlook, Excel or other packages. 3. Do the hustle Regardless of the vendor you pick, look for reassurance that the solution Read More

eBay Looking For Sun Block?


The now-infamous 1999 shutdowns of the eBay website has led them to consider alternatives to their current Sun infrastructure.

james goodnight  to Sun's advertising campaign, James Sciales, an IBM spokesman, was quoted regarding their recent big win at Network Solutions Inc. In Big Blue's fight to regain market share from Sun for computers that power the Internet, it's a case study of what IBM is best known for - leading technology. Sun's Doug van Aman responded by downplaying the server shift. IBM sold Network Solutions one system, he said. We have many, many, many systems at Network Solutions. The (Sun) E450 server is a smaller server, Read More

Performance Management Simplified by MSPs


IT infrastructure consisting of networks, servers, databases, and even parts of application systems forms a networked computing system (NCS) whose performance must be actively managed to ensure continual business support. But the skills and tools necessary to ensure that network and server systems provide adequate levels of services and performance are expensive and scarce. Management service providers (MSPs) that specialize in performance management can apply expert personnel and 24/7 monitoring at a fraction of the cost required to staff the function internally.

james goodnight  in a column by James F. Dowling in Mid- Range Computing . Look for other previously published Mid - Range Computing columns by Mr. Dowling at this site or visit Midrange Showcase at www.midrangecomputing.com/showcase/. What's Involved? A comprehensive networked computing performance management program encompasses the following: Architecture to establish a plan for how NCS components are interrelated Service level commitments to link NCS and business performance measures Availability measures to record Read More

Can You Add New Life To an Old ERP System?


Getting ERP transaction data into a summarized form that is useful to knowledge workers is one way to extend the value of your ERP system. This article discusses the advantages that can be gained by moving ERP and other transaction data to a data warehouse.

james goodnight  to ensure its integrity. James F. Dowling pointed out in the TEC article, Business Basics: Unscrubbed Data is Poisonous Data data should be managed as a corporate asset that appreciates in value over time. Historical data must be addressed with as much care as current database content . The Data Warehousing alternative uses a better approach. It packages the information in data cubes that are customized for each group of users. Once the information is packaged in a data cube, users can extract the Read More

Want to Turn Your Workforce into a Real Community? EnterpriseJungle Can Help


How often do we feel that we hardly know the person sitting in the cubicle next to ours, let alone someone sitting in our company’s Hong Kong or Sydney office? Yet, unbeknownst to us that colleague could have expertise and connections that would be of great importance for our next project. Workforce access to information, knowledge, and opportunity has direct correlation to productivity, retention

james goodnight  we recently talked to James Sinclair, a co-founder of EnterpriseJungle. Sinclair has been in the technology industry for 14 years in various forms, from working with major corporations, including IBM , Xerox , and EDS , to being at the “coalface” of the entrepreneurial community. He started quite young and went through some early moderate exits, which led to a number of advisory roles with emerging companies seeking to accelerate growth. With an understanding of multiple technology platforms as well a Read More

Security Stocks Burn Rubber


Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and what kinds of security products do they offer?

james goodnight  security professionals of tomorrow. James Shea, director of the Center for Business Information Technology at Syracuse University says that, To ensure that our students are among the IT leaders of the future, Syracuse University is partnering with cutting-edge technology companies like CyberGuard. Other universities that Cyberguard has partnered with include the University of South Carolina with campuses in Charleston and Columbia and Charlotte, N.C., the New York Institute of Technology in Manhattan Read More

10 Fundamental Strategies for Choosing the Right ERP Finance and Accounting Solution for Your Company


Big-name vendors are competing with those that have long catered to midsized enterprises. With a little savvy, midsize companies can make the dynamic enterprise resource planning (ERP) market work to their advantage. Learn the industry’s top 10 strategies to grow your company and revenue by upgrading from an out-of-the-box finance solution to one that better connects systems and processes throughout your business.

james goodnight  smaller, midsized company, said James Norwood, Epicor Software's vice president of product marketing. Norwood points to the company's Epicor Information Worker (IW) as a product tailored for midsized companies, since the solution packs basic CRM and ERP functionality along with supply-chain management functions and presence technology all of which can be accessed via Microsoft Outlook, Excel or other packages. Do the hustle . Regardless of the vendor you pick, look for reassurance that the solution you Read More

The Future of Secure Remote Password (SRP)


The Secure Remote Password (SRP) holds great promise as a way to strongly authenticate a user without the usual risks of dictionary attack(s) faced by other password-based authentication schemes. Yet the industry de-facto standard remains the password-based authentication scheme. This article explores the possibilities for SRP in today’s multi-channel world, specifically how it improves upon the inherent insecurity of password authentication and the obstacles to overcome to succeed.

james goodnight  a BS degree from James Madison University . Brenda may be reached at bcoulson@cysive.com . References http://srp.standford.edu - Home Page for the SRP Authentication Project of Stanford University The Secure Remote Password Protocol , Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium , San Diego, March 1998, pp. 97-111. http://world.std.com/~dpj - David P. Jablon home page. David is the CTO of Phoenix Technologies ( http://www.phoenix.com ), and creator of SPEKE pr Read More