X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 mail of request


The Art Of Distributed Development Of Multi-Lingual Three-Tier Internet Applications
In this article we describe author's experience with the distributed development of multi-lingual three-tier Java/ CORBA/database Internet applications. We

mail of request  the phone and via e-mail, thus software was developed solely in a telecommuting fashion. Once the database and CORBA stubs were set-up on the development site, and a basic skeleton of the application was set-up on the production site, it was easy to gradually build the application on the development site and test it on the production site. Software was shipped via e-mail in the form of compiled JAR (Java Archive) files and static text, HTML (Hyper-Text Markup Language), and graphic files. Throughout the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Intelligence (BI) and Data Management

Get a shortlist of BI solutions based on your company’s needs and characteristics. It’s fast, free, and easy—and you’ll get the results immediately. 

Evaluate Now

Documents related to » mail of request

E-mail Encryption: Protecting Data in Transit


Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre-assign various setup options before the software is rolled out, which can be locked so that the user can no longer change the default settings. Learn more about the main properties of Secure Mail and get an overview of the possible configurations the product offers.

mail of request  main properties of Secure Mail and provides an overview of the large number of possible configurations the product offers. Table of Content   1 Introduction It would be impossible to imagine the world of business today without electronic communication via e-mail. Yet, messages are often sent unprotected across open networks with nothing to guarantee the confidentiality, authenticity, and integrity of a message. Nevertheless, these aspects are of vital importance for the effective and safe use of e-mail i Read More

Best of breed versus Suite Anti-spyware


The anti-spyware industry is going in two separate directions. First, there are suite products that come with other security applications, along with anti-spyware. Second, there are best-of-breed products that are purely focused on detecting and eradicating spyware. Depending on the type of organization, choosing a suite-based anti-spyware over best-of-breed software can leave a company vulnerable.

mail of request  and pulled off the e-mail addresses of the people within the targeted organization. At that point, we assumed that the people would check e-mail on the systems that they used to access the SCADA systems. Next, we had the team create an e-mail that lured company employees to a web site that would unknowingly download spyware onto the system. The spyware allowed us to control the system, and therefore the SCADA systems that controlled a nuclear reactor. Needless to say, the plan worked like a charm. If anyt Read More

Meeting Request Regarding PLM Research/PLM Buyer Behaviour Report


The PLM user landscape is changing

mail of request  please respond to this e-mail or contact TEC at 514-954-3665, ext. 256 Neil Stolovitsky Analyst Services Manager analysts@technologyevaluation.com Tel: 514-954-3665, ext. 256 Read More

Reducing the Cost of Systems Operations


Disintermediation is the process of removing redundant intermediaries from a systems management infrastructure. Once vital to systems monitoring, proprietary agents are now made largely redundant by native management tools, emerging standards and agentless monitoring architectures. Centauri makes disintermediation possible by providing a low-cost event management solution that unifies performance data and event messages under a common umbrella. This paper describes how you can take advantage of the disintermediation opportunity and minimize the risks of migrating from working proprietary data collectors to a new native-agent based solution.

mail of request  service, FTP service, and mail services (SMTP, IMAP4, POP3). These adaptors operate in an agentless configuration. Because an agentless monitoring configuration does not require an agent to be installed on the managed server, these monitors can be set up quickly and easily. Centauri supports agentless monitoring in a number ways. One method is to connect to a server via the standard Telnet (or Secure Telnet) interface. Centauri's Telnet based screenscraper allows performance data to be retrieved from any Read More

Software-as-a-service ERP versus On-premise ERP through the Lens of Total Cost of Ownership


This IDC white paper looks at the growing applicability of software as a service (SaaS) for enterprise-level business applications, and analyzes the adoption rate and total cost of ownership (TCO) of this technological approach. Download this white paper to find out how a hosted option can drive significant cost savings, reduce initial implementation times, and bring new functionality with relative ease and convenience.

mail of request  as-a-service ERP versus On-premise ERP through the Lens of Total Cost of Ownership This IDC white paper looks at the growing applicability of software as a service (SaaS) for enterprise-level business applications, and analyzes the adoption rate and total cost of ownership (TCO) of this technological approach. Download this white paper to find out how a hosted option can drive significant cost savings, reduce initial implementation times, and bring new functionality with relative ease and Read More

Challenges of the Future: The Rebirth of Small Independent Retail in America


By any measure, retailers are overwhelming small businesses. More than 95 percent of all retailers have only one store. Almost 90 percent have sales less than $2.5 million (USD), and more than 98 percent have fewer than 100 employees. To compete, small businesses need to be innovative, and understand both personalization and value, and how to execute best practices to build success.

mail of request  to proactively micro-market, to mail merge a postcard or letter that says, ?I'm certain that because you bought X you'll like to know we just got Y,' is very powerful stuff. Many of the profiled retailers we spoke with are making use of this new technology to help identify, segment and understand their best customers better with the goal of getting and acting on the kind of information that will facilitate better marketing decision-making and instigating more sales. For examples, see many of the Read More

IDC and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security


The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many security vendors are creating anti-spyware software to seek out spyware and eradicate it from the enterprise network. Webroot's Spy Sweeper Enterprise is just such a product.

mail of request  and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many security vendors are creating anti-spyware software to seek out spyware and eradicate it from the enterprise network. Webroot's Spy Sweeper Enterprise is just such a product. Read More
Polymita Technologies

Benefits of Using a Master Data Management System


Master data management (MDM) comprises a set of processes and tools that define and manage the non-transactional data entities of an organization (also called reference data). MDM provides processes for consolidation, quality assurance, and distribution of such data throughout a company to ensure consistency and control in the ongoing maintenance and use of this information. Discover the benefits of an MDM system.

mail of request  of Using a Master Data Management System Master data management (MDM) comprises a set of processes and tools that define and manage the non-transactional data entities of an organization (also called reference data). MDM provides processes for consolidation, quality assurance, and distribution of such data throughout a company to ensure consistency and control in the ongoing maintenance and use of this information. Discover the benefits of an MDM system. Read More

Beware of Vendors Bearing Solutions


Hype has been a major factor in the recent downfall of some of the enterprise application industry's most illustrious players. This article presents some very simple things that you can do to prevent yourself and your company from being tomorrow's lead story in the industry trades.

mail of request  of Vendors Bearing Solutions Introduction Hype. Years ago we called it leaning into the wind. It was a philosophy—maybe even an art—that enabled software companies to be competitive, to build market share, and to sell sufficient product in a timely enough fashion to fund ongoing development. If you leaned too far into the wind, you fell on your face. If you didn't lean far enough, you would watch their backs as your competition took the market share upon which you built your dreams. Leaning Read More

Dynamic Best Practices of Vulnerability Management


Vulnerability management, the discovery of vulnerabilities and assessment of the risk to the network, is a critical part of both the security and business landscape that any company’s security team needs to understand and implement for long-term success. But companies that rely totally on signature-based defenses can be helpless against many threats. Find out how to reduce risks by identifying and eliminating weaknesses.

mail of request  T 617.956.5000 F 617.956.5005 E-mail: info@yankeegroup.com Web site: www.yankeegroup.com Searches related to Dynamic Best Practices of Vulnerability Management : Laws of Vulnerabilities 2.0 | New Laws of Vulnerabilities | Reveals Vulnerability Half Life | Information Security Technical Report | Real World Vulnerability Data | Vulnerability Management | Laws of Vulnerabilities Research Methodology | Critical Vulnerabilities | Unveiled Laws of Vulnerabilities | Qualys CTO Presents Laws Vulnerabilities | Read More

The Market Impact of Two Powerhouses


This is an analysis of the equivalent moves of two superpowers to secure the lower-end of the market, also known as the small-to-medium enterprise (SME) market segment. One is Microsoft Business Solutions (MBS), the other is UK-based the Sage Group.

mail of request  addition to telesales, direct e-mail and Web ordering—entry-level or feeder business-application packages that attract small businesses early on, such as BusinessWorks Gold , Peachtree, or ACCPAC Simply Accounting . Then, the vendor provides more advanced functions and more scalable software as these businesses grow. Further, some smaller Sage/Best resellers grant customers the rights to their applications source code, which is unheard of by the larger vendors. The publicity coming from many failed Read More

The New Era of Mobile Intelligence: the Convergence of Mobile Computing and Business Intelligence


Computing is entering its fifth generation with desktop Internet applications giving way to a new generation of mobile Internet applications. As consumers capitalize on the power of mobile devices, the same transformation is occurring in business. Learn how the convergence of business information and analytics with mobile technology is empowering business people in a way that was never possible—until now.

mail of request  New Era of Mobile Intelligence: the Convergence of Mobile Computing and Business Intelligence Computing is entering its fifth generation with desktop Internet applications giving way to a new generation of mobile Internet applications. As consumers capitalize on the power of mobile devices, the same transformation is occurring in business. Learn how the convergence of business information and analytics with mobile technology is empowering business people in a way that was never possible—until now. Read More

Managing the Total Cost of Ownership of Business Intelligence: A 360-Degree Perspective


For many companies, total cost of ownership (TCO) of business intelligence (BI) solutions is out of control. And the problem is growing, fueled by ever-increasing demands from the user community, massive new sources for data, new capabilities, shadow it landscapes, and the cost of keeping people abreast of all the changes. This paper focuses on developing a framework for monitoring and managing the TCO of BI.

mail of request  the Total Cost of Ownership of Business Intelligence: A 360-Degree Perspective For many companies, total cost of ownership (TCO) of business intelligence (BI) solutions is out of control. And the problem is growing, fueled by ever-increasing demands from the user community, massive new sources for data, new capabilities, shadow it landscapes, and the cost of keeping people abreast of all the changes. This paper focuses on developing a framework for monitoring and managing the TCO of BI. Read More