X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 technical architect


Establishing Enterprise Architecture Governance
This article discusses the issues around implementing architecture governance, and what constitutes viable approaches to establishing effective governance

technical architect  be very involved with technical architecture review. Determining which projects get reviewed Should all projects get reviewed, or only the large ones? While it may be appealing to reserve architecture review for projects deemed significant , in practice this can get messy. Defining the threshold is difficult (and can be political). All projects should have some level, if only to determine their impact, and need for a complete review process. Thresholds may be used to drive the types and depth of review.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Help Desk for the Health Care Industry

Help Desk is an application for assisting and managing calls for support from computer users. It also includes computer and software inventory tracking along with technical support knowledge bases.  

Evaluate Now

Documents related to » technical architect

Cloudera and Xplain.io: Enhancing Hadoop’s Enterprise Readiness


Cloudera, a provider of enterprise analytic data management solutions, recently acquired Xplain.io, a self-service analytics provider. Get TEC BI analyst Jorge García's take on the acquisition, and how it will allow customers to run robust big data management with powerful self-service analytics.

technical architect   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

technical architect   Read More

Rich Internet Applications (RIA): Opportunities and Challenges for Enterprises


Rich Internet applications (RIAs) represent the next wave in the evolution of web applications, as they promise the richness, interactivity, and usability lacking in many of today’s web applications. However, as with any technological innovation, with the new opportunities come new challenges to be negotiated. What are the business benefits of adopting RIA, and what are the risks?

technical architect   Read More

When the Bigger Fish Eats the Smaller to Become a Bigger Fish


This time the merger and acquisition of Connect-Care by Firstwave appears to be a search for vertical market access. Connect-Care provides a direct reach to 87 software vendors that may represent both vertical expertise and a network of resellers. The stakes are high. Will the Firstwave technical lead and the Connect-Care vertical expertise bring a best-of- breed CRM application that the market needs?

technical architect   Read More

Case Study: CRM Solution’s Superior Workflows and Multitenancy Create Stronger Customer Service


The Linc Group, provider of infrastructure and technical services, knows that client prospecting and retention are key to long-term success. To optimize the success of company and franchise offices, the company implemented customer relationship management (CRM) software from Microsoft Dynamics, recently upgrading to version 3.0 for enhanced workflow features. Learn more about how the company benefits from the solution.

technical architect   Read More

PopWare Inc.


We are not all things to all people: we are Asset Management experts! We are an independent third party who can help you evaluate, implement, integrate, and optimize your application suite. We are unbiased as to which application you select, and can work with any major vendor''s software. Our only motive is your success. To help you achieve this, we provide technical and application consulting services, and products that compliment and optimize the various vendor''s software offering. Our products include Microsoft Exchange or Lotus Notes based Advanced Workflow Approval, Vendor Communications Module that automates all aspects of communicating with your vendors, Web Portals and Interfaces, Data Warehouse, Purging/Archiving/Auditing, and Wireless Barcode Inventory and Mobile Work Management solutions. Our services include Implementation, Technical, Integration, Conversion, and Workflow Consulting, as well as Application and Technical Training, Report Development, and Customization services. All in an effort to optimize your asset management!

technical architect   Read More

New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause


The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.

technical architect   Read More

4 Key Steps to Automate IT Security Compliance


An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and enforce IT security. Companies are under increasing pressure to control their IT infrastructures more effectively. Learn how ongoing automated vulnerability assessments, together with well-defined network security policies, can simplify the compliance process.

technical architect   Read More

War Looms in the On-demand CRM Market (and Beyond)-But Will You Profit from It?


Salesforce.com is now an almost unstoppable force in the world of on-demand customer relationship management. However, it may be the architect of its own downfall—and Microsoft is poised to take advantage. But will you profit from the Salesforce.com-versus-Microsoft war?

technical architect   Read More

Rewrite or Wrap-Around Old Software? Part One: Event Summary


Product architecture is going to do much more than simply provide the technical functionality, the user interface (UI)/presentation, and the platform support. It is going to determine whether a product is going to endure, whether it will scale to a large number of users, and whether it will be able to incorporate emerging technologies, all in order to accommodate increasingly evolving user requirements.

technical architect   Read More