X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 return to vendor


EXE Latest Vendor to Join IBM Supply Chain Club
IBM and EXE Technologies today announced a global strategic relationship in which the two vendors will provide supply chain customers with integrated solutions

return to vendor  Metro Richelieu, no tangible return on the arrangement will be gained by the new partners in the short term. Users in the retail or wholesale distribution sectors may want to look at the Exceed WMS product, originally developed for the Unix and mainframe environments, as it would be a fairly safe bet in this incarnation. However, Unix users should include other offerings on a short list, such as Catalyst International's CatalystWMS. Although EXE successfully completed compatibility testing on Windows

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Performance Management

Business performance management (BPM) enables organizations to translate strategies into plans, monitor execution, and provide insight needed to manage and improve financial and operational performance. This knowledge base covers scorecards, dashboards, business activity monitoring, and more.  

Evaluate Now

Documents related to » return to vendor

RedPrairie: Enabling End-to-End Supply Chains (from Manufacturer to Retail Shelf)


RedPrairie provides best-of-breed supply chain execution, workforce, and all-channel retail solutions designed to streamline and expedite the flow of goods from raw materials into the hands of the consumer. In this article, TEC senior analyst P.J. Jakovljevic describes how the company has positioned itself through its acquisitions, outlook, and integration initiatives to be able to fulfill its “Buy Anywhere—Fulfill Anywhere” philosophy.

return to vendor   Read More

Baan Yet Another ERP Vendor to Find a Sanctuary Under Invensys’ Wing


On June 1, languishing Dutch ERP vendor The Baan Company finally found a 'knight in shining armor'. British automation equipment maker Invensys has agreed to pay $2.65 per share for Baan. The deal is valued at approximately $709 million.

return to vendor   Read More

To Upgrade, or Not To Upgrade: That Is Not The Question-But How To Upgrade Is


Companies can easily spend hundreds of thousands of dollars implementing an enterprise resource planning (ERP) package. After completing this rollercoaster ride, however, companies are typically faced with the question of whether to implement the latest, greatest version of the package.

return to vendor   Read More

Lectra First PLM Software Vendor to Achieve TEC Certification for PLM for Fashion and PLM for the Distribution of Fashion Products and Accessories


Paris, January 4 2011 — Lectra, the world leader in integrated technology solutions for industries using soft materials—textiles, leather, industrial fabrics, and composites—has announced that Lectra Fashion PLM V2R2, its product lifecycle management solution designed specifically for the fashion industries, has just been awarded certification from TEC. Lectra Fashion PLM is the only solution to have achieved TEC certification in the fashion and fashion products and accessories distribution sectors.

return to vendor   Read More

The IT Tipping Point for Midsized Companies: Deciding When to Move to Tier-one ERP


Many successful midsized companies reach a point when transitioning to a tier-one enterprise application system is necessary. Transitioning to a new enterprise resource planning (ERP) system is a challenge—but it may not be as complex as you think. Learn common myths about tier-one ERP systems, as well as how ERP solutions can help you manage regulatory compliance and track performance with key performance indicators.

return to vendor   Read More

Roadmap to a Successful Cloud Implementation: 5 Steps to Consider for Ensuring a Successful Implementation


If you are a growing midsize organization, chances are you are or will soon outgrow your entry-level accounting system. More and more companies are turning to cloud enterprise resource planning (ERP) systems—namely software-as-a-service (SaaS)—to modernize their current systems and lay the foundation for future growth.

SaaS ERP offers and intuitive user experience, modern functionality, and the ability to conduct business anywhere via mobile devices. Cloud ERP also offers more favorable economics with subscription-based licensing and minimal need for IT resources to support it. Reduced implementation times also offer faster time-to-value.

This white paper looks at advantages of cloud systems and some factors to keep in mind. While SaaS ERP systems provide faster implementation times over on-premise solutions, you still need to carefully manage your implementation project to ensure current and ongoing success.

return to vendor   Read More

How to Reshape Your Supply Chain Network (and Why You Need to Do It Now)


The landscape of the supply chain has changed drastically over the past five years. It went from local to global in manufacturing, procurement, sourcing, logistics, and customers. As such, there are some major challenges in the supply chain network: There are no boundaries within the network. There are no physical or virtual boundaries left within the supply chain. For example, the

return to vendor   Read More

Informix to Acquire Ardent Software-Another Vendor's Attempt at End-to-End Data Warehousing


Informix« (NASDAQ: IFMX) and Ardent Software (NASDAQ: ARDT) today announced that they have reached a definitive agreement to combine their operations in a transaction valued, on a fully diluted basis, at approximately $880 million, based on the closing price of Informix common stock on November 30, 1999. The combination creates a $1 billion company in open software infrastructure for what Informix refers to as the "i.Economy". Ardent's components and solutions will continue to be marketed independent of the underlying database technology.

return to vendor   Read More

TEC Joins Forces with EOH Technology Consulting to Assist Businesses Matching Software Choices to Strategic Requirements


TEC Joins Forces with EOH Technology Consulting to Assist Businesses Matching Software Choices to Strategic Requirements EOH Technology Consulting (EOH) and Technology Evaluation Centers (TEC) announce the launch of a new alliance designed to assist companies with comparing, evaluating, and selecting enterprise software.

return to vendor   Read More

The Guide to Google Apps Training: Part Two: How to Secure a Google Apps Domain


You don’t have control over attempted attacks on your domain, but putting the right security systems in place means you can block access to your data and your domain. Google Apps provides users with a wide variety of customizable options to ensure that a domain is secure. Google Apps features stringent user access controls, governing how and when selected users gain access to the domain, and a disaster recovery system in order to retrieve any data compromised due to a security breach.

In this white paper, learn the basic systems and settings for a variety of security features, including development of domain recovery options, enforcement of secure sockets layer (SSL) connections, how to configure two-factor authorization for maximum mobile security, and the importance of auditing and setting long minimums for passwords. You’ll also read how the Google Apps system works to create the best mobile security for your domain, and how installation of a Google Apps Device Policy can further protect your domain in case of device theft. Get information on the disaster recovery features included in the core Google Apps, and how third-party systems such as Backupify can be added to further strengthen data recovery options, ensuring that duplicate copies of documents are available. Through these controls, users can be assured that their domain data is secure.

return to vendor   Read More