X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 sssl explorer


Distilling Data: The Importance of Data Quality in Business Intelligence
As an enterprise’s data grows in volume and complexity, a comprehensive data quality strategy is imperative to providing a reliable business intelligence

sssl explorer  Data: The Importance of Data Quality in Business Intelligence Originally Published - October 20, 2008 The zeal to get as much business data to the user as soon as possible often prevails over the establishment of processes that control the quality of data. Low data quality standards can lead to bad business decisions and missed opportunities. Even with a data warehouse that is well designed and equipped with the best tools for business intelligence (BI), users will encounter inefficiency and

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » sssl explorer

Now Just Where Did I Put My Search Engine?


Barraged with terms like "structured and unstructured data," "enterprise search," "federated query," and "business intelligence and analytics," corporate decision makers are awash in ambiguous and overlapping meanings. Making the distinction between metadata and data may reduce the confusion.

sssl explorer   Read More

Agresso + CODA, VITA + Link (+ CODA 2go): What's the Sum? - Part 2


Part 1 of this blog series described Unit 4 Agresso’s (or Agresso in further text) dual product strategy following its acquisition of CODA in 2008. The post then went on to analyzing (and reinforcing if you will, given a number of previous blog entries on the same topic) the post-implementation agility capabilities of Agresso Business World (ABW) [evaluate this product]. The blog post attempted

sssl explorer   Read More

How Mobile Technology Is Changing Talent Management


With the fast pace of businesses today, employees need to stay connected and continue to be productive from wherever they are. Organizations are thus looking for ways to leverage mobile technology to maintain a competitive edge. TEC analyst Sherry Fox outlines how mobile technology is changing the way companies manage their talent in the areas of recruiting, learning, and performance management, and what to expect for 2012.

sssl explorer   Read More

What’s New in the World of Design Components and Kernels?


Those folks that follow the 3D and 2D computer aided design (CAD) space are aware that all major design, manufacturing, and engineering software products are based on geometry modeling kernels and a variety of other development components. Spatial Corp., a Dassault Systèmes subsidiary, is one prominent provider of 3D development software components for technical applications across a broad range

sssl explorer   Read More

KXEN, An Important New Asset in the Evolution of SAP Analytics


A couple of weeks ago when I was on briefed on KXEN, the predictive analytics technology provider, I was completely unaware of the deal that was being struck behind the scenes between KXEN and the German software giant SAP, which culminated in KXEN’s acquisition by SAP. The more I think about it, the more this seems to me to be another impactful acquisition by SAP, with KXEN serving as a key

sssl explorer   Read More

Accounting for SMBs: A Solution Beyond Entry-level Systems Red Wing Software


Many SMB companies need more functionality than an entry-level system offers, but cannot afford to pay $15,000 (USD) or more for a higher-end product, nor do they really need the complexity found in these products. Red Wing Software’s TurningPoint is a good mid-market product that plays well in this market.

sssl explorer   Read More

eMachines to Ship Appliance


eMachines, the computer company that made its name on low-priced desktop models, has stepped into the Internet appliance ring with its 'MSN Companion' system.

sssl explorer   Read More

Visibility.net


VISIBILITY.net is an enterprise resource planning (ERP) solution for product manufacturers. It consists of integrated modules for managing customer relationships, quotes, projects, costs, manufacturing, business performance, and finance. VISIBILITY.net provides complex product manufacturers with functionality to collect and distribute information enterprise-wide for business functions such as sales, quoting, engineering, production, procurement, finance, and service. This can help manufacturers accurately track project costs, allocate engineering resources, and monitor schedules. VISIBILITY.net makes native use of the .NET framework and object-oriented technology, and does not require additional middleware or integrated applications. It supports Microsoft® SQL Server and Oracle® databases. It is a mobile application that will run on any device and supports all modern browsers such as Chrome, Internet Explorer, and Safari.

sssl explorer   Read More

Epicor 9: Delivering What Oracle and Others Are Yet to Achieve? - Part 2


Part 1 of this blog series outlined Epicor 9 (aka Epicor ERP [evaluate this product]), Epicor Software’s next-generation converged product suite. A similar feat has yet to be accomplished even by mighty Oracle within Oracle Fusion Applications. The article also discussed Epicor’s accompanying “Protect, Extend, and Converge” strategy for providing customers with  a migration path choice on their

sssl explorer   Read More

Microsoft Hopes to Win Over Consumer Privacy Advocates


Microsoft aims to assist users understand privacy issues by embedding privacy agents into its web browser

sssl explorer   Read More