X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 samples of rfp


An Overview of the Knowledge Based Selection Process
The TechnologyEvaluation.Com’s (TEC) Knowledge Based Selection Process is a multi-part comprehensive analysis of a vendor’s tactical, strategic and qualitative

samples of rfp  Overview of the Knowledge Based Selection Process An Overview of the Knowledge Based Selection Process B. Spencer, J. Diezemann & J. Dowling - March 15, 2001 Introduction The TechnologyEvaluation.Com's (TEC) Knowledge Based Selection Process is a multi-part comprehensive analysis of a vendor's tactical, strategic and qualitative measures as compared to the specific business and technology needs of our clients. The selection process encompasses nine process steps: Capability Assessment/Request for

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Intelligence (BI) RFI / RFP Template

Reporting and Analysis, Analytics, Data Warehousing, Workflow, Data Integration, Support, and System Requirements  

Start Now

Documents related to » samples of rfp

Knowledge Based Selections


Knowledge Based Selections allow companies to truly reach an optimum and justifiable technology decision. Knowledge Based Selections have several unique characteristics that enable a company to rapidly and effectively marry internal business requirements with a myriad of vendor attributes that relate to both product performance and long-term value to clients.

samples of rfp   Read More

A Case Study and Tutorial in Using IT Knowledge Based Tools Part 2: A Tutorial


This tutorial, part 2 of a two part series on Knowledge Based Selection, demonstrates the selection processes and capabilities of Knowledge Based Selection Methods and Tools. These tools, integrated with business decision making procedures, can arguably reduce selection risk and improve chances for success in IT projects. Given the appalling rate of IT project failures, selection can potentially help reduce risk in some 30% of cases, with an associated estimated cost of about $30B annually to industry according to some sources. In this tutorial, we illustrate a number of the procedures for rapid decision processing through the real-life selection of a PDA device. The process gave confidence to the argument to wait for the solution, while weighing risk against return.

samples of rfp   Read More

PDM vs. PLM: A Matrix View


Two recent blog posts by Oleg Shilovitsky (PDM vs. PLM: A Data Perspective and PDM vs. PLM: A Process Perspective) got me wondering about what a true product lifecycle management (PLM) system actually is. In his posts, Shilovitsky discussed the differences between product data management (PDM) and PLM from the perspective of data (scope and control of the data) and process (coverage of

samples of rfp   Read More

TradeStone Software STARS 2013: Retail Rocks! Part 2


Part 1 recapped TradeStone Software's user conference, STARS 2013. TradeStone’s Core Capabilities TradeStone Software’s bread-and-butter capabilities continue to be sourcing, supplier management (including quality testing, inspections, and social, legal, and compliance-based supplier performance as exemplified in Guitar Center’s case study), and order management, which includes global trade

samples of rfp   Read More

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

samples of rfp   Read More

Nintendo of America, Inc.


With a focus on marketing, sales, and distribution of the company’s interactive entertainment products, Nintendo of America’s 180 “managers of image” market Nintendo’s games throughout the United States and parts of Canada. Because these managers spend the bulk of their time visiting retail operations to successfully brand the Nintendo product, the company was searching for a way to communicate detailed information to them, as well as to the rest of the company’s workforce. Nintendo also wanted to simplify the benefits enrollment process for employees and allow them to change their personal data on their own and at their convenience, without contacting the HR department.

samples of rfp   Read More

Institute of Management Accountants


The Institute of Management Accountants (IMA) is a worldwide association of accountants and financial professionals. The IMA provides certification, training, and research.

samples of rfp   Read More

The Evolution of the Last-mile Supply Chain


“Last-mile supply chain services” is an evolving segment of the supply chain industry, but a cutting-edge segment that has evolved as supply chain managers across the US struggle to cope with the inadequacies of the current globalized supply chain model. Learn five reasons why current supply chain models are flawed and how you can use a new architecture to balance supply chain risk, globalized sourcing, and economics.

samples of rfp   Read More

Forecasting Total Cost of Ownership for Initial Deployments of Server Blades


For organizations deploying many servers, total cost of ownership (TCO) analyses favor blade over rack-optimized systems. Blade server systems—reducing both capital and operating expenses—exploit economies of scale when deploying servers in volume. Saving power, cooling, and space by more than 25 percent, the blade advantage is particularly relevant for servers working in conjunction with storage area networks (SANs).

samples of rfp   Read More

IDC and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security


The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many security vendors are creating anti-spyware software to seek out spyware and eradicate it from the enterprise network. Webroot's Spy Sweeper Enterprise is just such a product.

samples of rfp   Read More