X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 unsolicited application example


Experiencing a Different Corporate Culture at QAD Explore 2008
No, my intent here is not necessarily to provide a typical analyst alert after attending a vendor's annual user conference, in this case the QAD Explore 2008 in

unsolicited application example  on some issues even unsolicited by me. Hmm, did I also forget to say that no single meeting had an assigned PR/AR staffer to take notes religiously and make sure that nothing sensitive is asked and answered? Furthermore, while attending some deep-dive breakout sessions, I was surprised to hear the presenter go off on what the product cannot do, not only when asked about some nitty-gritty functionality by the well-versed user audience, but also to voice a sentiment of wishing that a certain capability was

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, Applications Software

This RFP is focused on the selection of companies who provide outsource services in the areas of application software. The typical types of activities that these outsource providers perform include software development; software maintenance; software reengineering/rearchitecting; porting software to a new platform; defect correction and bug fixing; and software testing; etc. Application areas could include core applications, enterprise applications, web applications, integration between applications, mainframe applications, desktop applications, wireless applications, software packages, and games. 

Evaluate Now

Documents related to » unsolicited application example

Buyer’s Guide: Managed Hosting Services


Hosting a Web site in-house can be expensive, as it requires the necessary hardware and software and power and security precautions—not to mention the cost of bandwidth. To reduce costs and increase both security and performance, some companies are turning to “shared” solutions such as managed hosting and colocation. Before implementing one of these solutions, learn what your options are, and the questions to ask vendors.

unsolicited application example   Read More

What Have Epicor and Activant Been Up To (Post-Merger)?


April 2011 saw the merger of Epicor and Activant Solutions to create a global leader in business software solutions. TEC principal analyst P. J. Jakovljevic sits down with CMO John Hiraoka to discuss the opportunities and challenges created by the merger and the potential synergy of the combined company, Epicor Software Corporation, to grow a wide range of products and industries, a very ambitious yet difficult-to-realize strategy.

unsolicited application example   Read More

Maintenance Software--Plan Ahead to Maximize CMMS Vendor Web Site Visits


For those looking for a computer maintenance management system (CMMS) vendor, the Web is often the first place to start. There are a number of web site features one should examine in order to maximize web site visits. Reprinted with permission from Plant Engineering and Maintenance magazine.

unsolicited application example   Read More

How to Defend Against New Botnet Attacks


In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack.

unsolicited application example   Read More

SynQuest, Ford Deliver a Novel Application for Inbound Logistics


SynQuest’s joint development venture with Ford has produced a planning engine for inbound logistics that optimizes constraints along multiple dimensions –material, temporal, and spatial. Currently live at Ford, the application will soon be available to the market at large.

unsolicited application example   Read More

Custom Application Development


Custom application development is a trusted, tested strategy to ensure effective application of resources for business advancement and continuity, with minimal risk and solid return on investment (ROI). What’s that, you say? High cost? Low dependability? Long timelines? The custom application development model is plagued by myths. Find out why they’re all wrong.

unsolicited application example   Read More

Migrating to Linux: Application Challenges and Solutions


Linux operating systems are taking the world by storm, and have seen double-digit growth rates for seven consecutive quarters. With its promise of higher performance and better stability and security, Linux has become the alternative to traditional Windows-based servers. By deploying Linux in key strategic areas and taking advantage of application publishing solutions, you can lower your costs and speed time-to-market.

unsolicited application example   Read More

ITO: Application Related Services, Software Products and Associated Services


Softtek's information technology outsourcing (ITO) services consist of two areas: application related services, and software products and associated services. Under the rubric of application related services, Softtek offers application maintenance and support, application development, application modernization, and quality assurance (QA) and testing. Its software products and associated services include integration and deployment of enterprise resource planning (ERP), customer relationship planning (CRM), and business intelligence (BI). Application related services are those that cover the entire application lifecycle, including the designing, building, testing, implementation, and support of custom and packaged applications. Softtek's clients benefit from process efficiency, lean cost structures, rigorous service-level commitments, and global reach. In additon to development, maintenance and support, and modernization, Softtek also offers data integration services, and ERP services for SAP and Oracle applications. For Latin American markets, Softtek offers packaged software product solutions and associated services, such as training and first level support. Softtek is a value-added reseller (VAR) for some of the world’s most renowned software solutions, including: ERP, data integration, and BI. Softtek is a VAR of products from SAP, Informatica, Cognos, and Business Objects. The company also offers post-sales support and education services.  

unsolicited application example   Read More

What's Wrong With Application Software? - A Possible Solution? What Is It, Why And How Does It Fit Into Your Future


The series, 'What's Wrong With Application Software' explored key challenges found in enterprise applications and also discussed the characteristics of next generation architectures that would provide better support for applications. Once such solution, model based architectures, deserves to be on an enterprise's 'technologies to watch' list.

unsolicited application example   Read More

The Business Value and ROI Achieved with Riverbed in Analyzing, Diagnosing, and Resolving Application Performance Issues


As organizations rely on IT to support critical business processes to an ever-greater degree, the importance of application performance management (APM) is growing. Organizations need to ensure that applications are operating at top efficiency from end to end to support critical business processes.

To better understand the business value of Riverbed APM solutions, IDC conducted a study of Riverbed customers, examining how they deployed and are using APM tools. The analysis showed that these customers are achieving an average payback period of 6.4 months and an average three-year return on investment (ROI) of 521 percent.

unsolicited application example   Read More