X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 secure horizons providers


Will a Tool Manufacturer and a Supply Chain Software Vendor
The merger of traditional brick-and-mortar manufacturer Illinois Tool Works with Internet-based Click Commerce is puzzling, but has some method to the madness

secure horizons providers  , a provider of secure extranet portal solutions (entailing compliance automation and content management), in 2004; bTrade , a specialist in secure connectivity and Internet-based EDI (see EDI versus XML—Working in Tandem Rather Than Competing? ) for trading partner and product information management (PIM) (see The Role of PIM and PLM in the Product Information Supply Chain: Where is Your Link? ), in 2004; and ChannelWave (a former PRM peer), with its channel management and service automation software

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Customer Care and Billing (CC&B)

Customer care and billing (CC&B) solutions typically support providers of utilities, telephony, cable, or other services providing companies. CC&B software includes functionality for mediation, provisioning, rating, reporting, financial systems, and billing for voice, data, content, and utility services. 

Start Now

Documents related to » secure horizons providers

Deltek, We Hardly Knew Ye: New Deltek at Insight 2011


Deltek has been a software provider that does the job as promised (and more), but the company and its products, with its focus on government contracting, have never been associated with "cool" and "exciting." What a difference a year can make! Technology Evaluation Centers (TEC) Principal Analyst P.J. Jakovljevic reports on the changes Deltek has been making, and speaks with some top execs about its strategy.

secure horizons providers   Read More

Portals: Necessary But Not Self-sufficient


Having moved beyond its original role as a standalone presentation layer to become a part of a larger technology stack, the portal is now considered part of a larger offering, be it in collaboration, vertical-specific applications, or application infrastructure and middleware.

secure horizons providers   Read More

The Need for Investment in Enterprise Innovation: Part Two


Sopheon – Where Innovation Means Business (and Vice Versa) Last week I talked about enterprise innovation management (EIM)/innovation performance management (IPM) in a blog post about how wise decisions regarding innovation investments can make a huge difference to a company’s success down the line. There are many practices and technologies that come together to improve the success of product

secure horizons providers   Read More

Business Process Overview: Warehousing Solutions


Warehousing processes are critical for the success of a distribution business. These processes are highly visible to your customers, and have a direct impact on their opinion of your company. If you cannot get the goods to your customers in the most efficient way, you risk losing their business. Your warehousing and logistics operations must translate into reliability and service.

secure horizons providers   Read More

Testing Secure Enterprise SOA Applications Across Wide Area Networks


Company employees, business partners, and customers all demand secure and low-response-time access to business applications—from wherever they are. While SAP addresses this need through its enterprise service-oriented architecture (SOA) solution, when security features are added the application response time is slower. So what’s the best way to test global SOA deployments? Read this white paper to find out.

secure horizons providers   Read More

Magic Quadrant for B2B Gateway Providers


Business-to-business (B2B) gateway solutions have matured to the point where they can support a wide range of projects. However, there are still functional differences—including product maturity, service-oriented architecture (SOA) enablement, architectural coherence, and community management—among competing solutions. Find out who the leaders, challengers, visionaries, and niche players are in the B2B gateway market.

secure horizons providers   Read More

We Are All IT Users Now: Managed Service Providers, Software as a Service, and the Management of Remote Devices


The network of devices used for information, security, and daily transactions is now ubiquitous, and everyone now relies on it even if they don’t acknowledge it. But network failure can cause widespread disruption, unhappy customers, unproductive employees, and lost business. Ensuring network availability, security, and efficiency is a job for experts who need powerful tools to carry out these tasks. Learn more.

secure horizons providers   Read More

Earthlink Leads the Way in DSL Security


DSL providers speed up their customers' Internet access, however, at the same time they also expose these customers to enormous security risk. Earthlink has gone the extra mile and is giving out free firewall software to all its DSL customers.

secure horizons providers   Read More

Secure Folder: File or Folder Encryption


Teamwork requires data to be shared, but security must be maintained. Folder encryption is an essential part of corporate security and protecting intellectual property. Secure Folder can provide a secure electronic workstation. Files and folders can be secured for users’ personal use, or configured so they are available for the shared, exclusive use of a selective group. Find out more about a desktop encryption solution.

secure horizons providers   Read More

Managed File Transfer: The Need for a Strategic Approach


A secure and accurate flow of information in your supply chain operations has never been more critical—and complex. Digital transfer of unstructured information is a security risk, for both confidentiality and compliance, and traditional file transfer methods are now falling short. A managed file transfer solution combining hardware, software, and networks can meet your demands for visibility, security, and compliance.

secure horizons providers   Read More