Home
 > search for

Featured Documents related to »  names database

ERP Vendor Lawson Software Extends to IBM's DB2 Universal Database
Lawson Software, a major privately held provider of enterprise resource planning software, today announced the delivery of its enterprise software applications

names database  winners. Red Herring magazine names Lawson the strongest private ERP Company and lists Lawson among the world's top 50 private companies. Market Impact With the recent defection of SAP AG and Siebel (See TEC News Analysis article: Oracle gets SAP'ed by IBM December 8, 1999), to the IBM DB2 Universal Database platform as their preferred back-end database, IBM is making strong strides in making themselves the preferred database for many vendor's ERP solutions. As they continue to take business away Read More...
Warehouse Management Systems (WMS)
A warehouse management system (WMS) should provide database and user-level tools in order for a company to optimize its storage facilities while at the same time providing user level task direction...
Start evaluating software now
Country:

 
   

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » names database


BI Analysis in a Nutshell: Lyzasoft
In my previous post, Give BI to the Masses, I wrote about the strategies that have been implemented in some companies to empower more and more users to use

names database  trying to identify table names like  “x,” “y,” or “wkid.” Also, because of the “one product” orientation of the solution, there seems to be no integration with the office applications tools that are sometimes necessary. Regardless of the pros and cons (which product doesn’t have them?), Lyza´s offer is an interesting proposal to close the gap between business analysts, IT managers, and operational users. I welcome your thoughts—please feel free to leave a comment below, and I’ll Read More...
Study Shows: FBI Alienates Industry Security Experts
A comprehensive study done by TechnologyEvaluation.Com has shown that, for years the FBI has been alienating industry security experts. Some of the best

names database  IRC chat logs, and names and contact information of people who had actually confessed to participating in the crime. The dot-org group said that the FBI chose to not even access the link with the details of the crime. Questions that come to mind are the following: Why did the FBI choose not to access the electronic evidence? Was the information entered into an Incident Response Database ? Has the perpetrator been instigating new denial of service attacks? Looking at Cases 1 and 2, we may surmise that if Read More...
The Art Of Distributed Development Of Multi-Lingual Three-Tier Internet Applications
In this article we describe author's experience with the distributed development of multi-lingual three-tier Java/ CORBA/database Internet applications. We

names database  and English languages respectively. Names and functions of files they contain are same except that their contents are written in different languages. In order to make software internally independent of any particular language, all language-dependent strings are referenced using their internal language-independent symbolic names. To achieve this, we used one instance of java.util.Properties class for each language known to the application. The Properties class contains a set of name-value pairs of Read More...
The Hidden Role of Data Quality in E-Commerce Success
Successful e-commerce relies on intelligible, trustworthy content. To achieve this, companies need a complete solution at their back- and front-ends, so they

names database  multiple-word fields such as names, addresses, product descriptions and search queries. Normalization - for standardizing spelling, abbreviations, format and recognizing word variations and synonyms. This facilitates matching input data to internal systems and shoppers' searches to your product master. The normalization strategies used for search should also be employed when loading product masters to create consistent, searchable e-catalogs. Fuzzy retrieval - for finding data without a precise key Read More...
Database Activity Monitoring: Intrusion Detection and Security Auditing
At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of

names database  Activity Monitoring: Intrusion Detection and Security Auditing At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable. Read More...
SAP's Dr. Peter Barth on Client/Server and Database Issues with SAP R/3
To address questions for a TEC customer, we interviewed Dr. Peter Barth, Technology Marketing Manager for SAP AG in Walldorf, Germany. The conversation covered

names database  s Dr. Peter Barth on Client/Server and Database Issues with SAP R/3 Event Summary To answer questions for a Technology Evaluation Center customer, a large utility in the northeastern United States, TEC interviewed Dr. Peter Barth, Technology Marketing Manager for SAP AG in Walldorf, Germany. Dr. Barth works for Corporate Technology Marketing, where his main focus is basis technology, the Business Framework and new technologies. After graduating from the Universities of Nancy in France and Saarbruecken, Read More...
The Teradata Database and the Intelligent Expansion of the Data Warehouse
In 2002 Teradata launched the Teradata Active Enterprise Data Warehouse, becoming a key player in the data warehouse and business intelligence scene, a role

names database  Teradata Database and the Intelligent Expansion of the Data Warehouse In 2002 Teradata launched the Teradata Active Enterprise Data Warehouse, becoming a key player in the data warehouse and business intelligence scene, a role that Teradata has maintained until now. Teradata mixes rigorous business and technical discipline with well-thought-out innovation in order to enable organizations to expand their analytical platforms and evolve their data initiatives. In this report TEC Senior BI analyst Jorge Read More...
PeopleSoft on Client/Server and Database Issues
To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture

names database  on Client/Server and Database Issues Event Summary To answer questions for a Technology Evaluation Center customer, a large utility in the northeastern United States, TEC interviewed Michael Daniels of PeopleSoft on how the PeopleSoft ERP product performs in the areas of client/server architecture and database management. Question: Is PeopleSoft designed as a fault tolerant environment? Exactly how is this accomplished? Is the failover manual or automatic? Mr. Daniels: PeopleSoft clients use a Read More...
Cost Effective Security and Compliance with Oracle Database 11g Release 2
Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is

names database  Effective Security and Compliance with Oracle Database 11g Release 2 Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read t Read More...
Informix Holds Fire Sale on Linux Database
Informix announced its continued commitment and investment to the Linux community with the release of Foundation.2000 and Cloudscape 3.0 on Linux.

names database  Holds Fire Sale on Linux Database Event Summary NEW YORK, February 2, 2000-Informix Corporation (NASDAQ: IFMX), the technology leader in the software infrastructure for the i.Economy and a leading Linux vendor, at LinuxWorld 2000 announced its continued commitment and investment to the Linux community with the release of Foundation.2000 and Cloudscape 3.0 on Linux. Informix committed to bring all core server products to the Linux platform, including its business intelligence suite. Linux Read More...
Best Practices for Deploying Oracle Database 10g on Pillar Storage
Growing demands on storage management system requirements can run counter to your need to lower costs. With Database 10g, Oracle introduced new features that

names database  Practices for Deploying Oracle Database 10g on Pillar Storage Growing demands on storage management system requirements can run counter to your need to lower costs. With Database 10g, Oracle introduced new features that can simplify database storage management to offer significant savings in both deployment cost and ongoing management overhead. Find out about best practices for deploying Oracle with Pillar’s Axiom storage system, with benefits to performance and management. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others