X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 p part 13


Microsoft’s Underlying Platform Parts for Enterprise Applications: Somewhat Explained - Part 1
I can partly understand analysts’ temptation to beat up on Microsoft’s forays into the enterprise applications space. To be fair,

p part 13  Applications: Somewhat Explained - Part 1 I can partly understand analysts’ temptation to beat up on Microsoft ’s forays into the enterprise applications space. To be fair,  the empire  has had its share of strategic and tactical miscues, as if it had wanted to give these naysayers some ammunition. For one, many analysts and market observers first criticized the giant for not having a unified enterprise resource planning (ERP) product line, but rather several diverse ones, coming from acquisitions

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Software Test Tools

Tools exist to support software testing at all stages of a project. Some vendors offer an integrated suite that will support testing and development throughout a project's life, from gathering requirements to supporting the live system. Some vendors concentrate on a single part of that life cycle. The software test tools knowledge base provides functional criteria you might expect from a testing tool, the infrastructure that supports the tool, and an idea of the market position of the vendor.  

Evaluate Now

Documents related to » p part 13

Eccentex-Enabling Do-it-yourself Case Management


Various types of vendors and products have taken hold of the business process management (BPM) software market. While there are mainstream BPM providers such as IBM, Oracle (see here), Pegasystems (see here), Tibco, etc., there is a crop of open source providers such as Bonitasoft (see here) and other relative BPM newcomers such as AuraPortal (see here). We recently came across Eccentex

p part 13   Read More

Increasing the Value of Your Enterprise Through Improved Supply Chain Decisions Part 3: Conclusion


There remains no shortage of experts and solutions that purport to have the keys to improving your supply chain. However, executives who bear bottom line responsibility for the performance of the enterprise would do well to evaluate every potential new program from the perspective outlined here.

p part 13   Read More

SSA Global Forms a Strategic Unit with an Extended-ERP Savvy Part One: Event Summary


SSA Global seems to be doing some proper thinking while continuing to acquire new software companies. Recent unification of its broadening collection of supply chain management (SCM) solutions under the SSA SCM brand and formation of a specialized Strategic Solutions division--which also includes other extended enterprise capabilities, such as customer relationship management (CRM), product lifecycle management ([PLM), and more—are both aimed at nurturing existing customers while attracting new prospects with products that exceed far beyond mere enterprise resource planning (ERP) capabilities.

p part 13   Read More

How Do You Categorize Notebooks?


The notebook computer market has become one of the remaining battlegrounds for computer manufacturers. Our purpose here is to define the notebook market segments, describe what the general characteristics of each segment are, and to give users an idea of what features they can expect for each segment.

p part 13   Read More

UNIT4: The (Largely) Untold Story - Part 2


Part 1 of this series started with my invitation by UNIT4 (formerly Unit 4 Agresso), the second-largest business applications provider in continental Europe, to attend its UK 2010 user conference. Frankly, I was a bit skeptical about what new and exciting I might see and hear about at this event in light of the vendor’s analyst tour in Boston in late 2009. My post then

p part 13   Read More

Lean Manufacturing: Part 1


With all the discussion, books, Web sites, and other materials on the topic of lean manufacturing, it's hard to know which resources are credible—much less understand the mounds of information. The first part of this series breaks down the definition of lean manufacturing into easy-to-digest concepts and shares the real-life example of a supplier of remanufactured solvents that is working toward the goal of lean. Get tips on how to determine what you need in your production operation and why.

p part 13   Read More

Deltek's Second Bite at the IPO Cherry (Part III)


Part II of this blog series analyzed the relatively recently launched Deltek EPM suite, which came as a result of three focused acquisitions. It also analyzed the suite's resulting potential cross- and up-sell opportunities and its prospective additional revenue for Deltek in a standalone manner. However, Deltek has not been sitting still when it comes to continually enhancing its core products

p part 13   Read More

Taking Stock of TAKE Supply Chain Solutions - Part 2


Part 1 of this blog series introduced TAKE Supply Chain, a supply chain management (SCM) division of TAKE Solutions, Ltd. The TAKE Solutions parent company is a global technology solutions and service provider, with significant focus across two principal business areas – life sciences and SCM, with an almost even breakdown of revenues between these divisions (the company is

p part 13   Read More

Outsourcing Security Part 3: Selecting a Managed Security Services Provider


As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security services provider.

p part 13   Read More

KANA Connect 2014—Morphing into Verint’s Engagement Vision: Part Two


In the second part of a two-part series about the KANA Connect 2014 conference, TEC's P.J. Jakovljevic takes a look at what has transpired since the KANA-Verint merger announcement and what we should expect from the actionable intelligence solutions vendor in the near future.

p part 13   Read More