X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 unsuccessful integration of acquisition



IFS Defence Ltd., a joint venture between BAE Systems and IFS, recently acquired iSC, a British custom software firm. However, some product integration issues

unsuccessful integration of acquisition  nature than IFS’s previous unsuccessful ones. Acquisitions of niche specialist companies, done to fill some functional gaps or to assert leadership in a certain vertical or geographic segment, usually make sense or justify themselves quickly. To that end, having originated from the realm of computer maintenance management systems (CMMS) for utilities in the 1980s, IFS has since become one of the leading suppliers of enterprise asset management (EAM) solutions, with a leading market share in the Europe,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, Applications Software

This RFP is focused on the selection of companies who provide outsource services in the areas of application software. The typical types of activities that these outsource providers perform include software development; software maintenance; software reengineering/rearchitecting; porting software to a new platform; defect correction and bug fixing; and software testing; etc. Application areas could include core applications, enterprise applications, web applications, integration between applications, mainframe applications, desktop applications, wireless applications, software packages, and games. 

Evaluate Now

Documents related to » unsuccessful integration of acquisition

Will Recent Acquisition Catalyze Catalyst’s Strategy? Part One: Event Summary


For years, Catalyst International was a leading public WMS/SCE vendor before missteps by its previous management team caused serious problems in strategy and execution. Over the past few years Catalyst's turnaround strategy has returned it to growth and profitability. As a result, it has recently been acquired by ComVest, a wealthy, private investment firm. This development may indicate private equity investors' renewed interest in this market and might validate the company's turnaround strategy that began in late 2001. Still, the question remains whether the anticipated infusion of capital from ComVest will enable Catalyst to become a consolidator and rejoin its mightier direct competitors in the industry's upper echelon.

unsuccessful integration of acquisition   Read More

JDA Portfolio: For the Retail Industry -- Part Five: Analysis of Market Impact


Given the competition for retail customers and wholesale orders is intense, retailers, including software vendors, must be able to meet consumer demand quickly, accurately and at the most competitive price. Despite its failed QRS acquisition, which promised to expand JDA's retail demand chain optimization applications, JDA Portfolio may be able to help retailers if it can overcome the challenges of servicing a fragmented sector and withstand the increasing competition.

unsuccessful integration of acquisition   Read More

Integrating All Information Assets Part Two: Why is integration an issue?


Successful e-businesses of the future will be those who treat e-business as the collection of processes, which allow multiple companies to work cooperatively and collaboratively to produce a seemingly seamless integration of businesses operating as a virtually vertical enterprise. And with this integration of business processes comes the requirement to integrate disparate business applications. This is an excerpt from the book ERP Optimization (Subtitle: Using Your Existing System to Support Profitable E-Business Initiatives).

unsuccessful integration of acquisition   Read More

Examples Of How Some Mid-Market Vendors Might Remain Within The Future Three (Dozen)? Part Two: Agilisys Market Impact


The most recent merger looks initially like a positive move for both companies and their customers, since Agilisys further enlarges a foothold in the discrete automotive manufacturing (which it has recently started with BRAIN) and solid SCE product modules that it might embed into its own SCM suite and possibly cross-sell into many industries (yet to be scrutinized, though).

unsuccessful integration of acquisition   Read More

Paradoxes of Software Estimation


Software development has spawned an independent industry in its own right. But the processes of asking for service, offering service, and pricing are all somewhat haphazard. Perhaps it's time to focus efforts on resolving the key paradoxes of software estimation.

unsuccessful integration of acquisition   Read More

Justification of ERP Investments Part 1: Quantifiable Benefits from an ERP System


Studies that surveyed manufacturers about the impact of ERP systems on firm performance indicate that company size and industry do not affect the results. Benefits have been indicated for large and small firms, whether they make standard or custom products or are in discrete or process manufacturing environments. This section explains the quantifiable benefits in terms of several areas of improvement. Reprinted from Maximizing Your ERP System by Dr. Scott Hamilton.

unsuccessful integration of acquisition   Read More

Point of Sale: To Stand Alone or Not?


When selecting a point of sale (POS) solution, users have a choice between stand-alone solutions and integrated solutions. They should first evaluate core and non-core components of POS systems, and assess the strengths and weaknesses of best-of-breed and integrated approaches.

unsuccessful integration of acquisition   Read More

Dynamic Best Practices of Vulnerability Management


Vulnerability management, the discovery of vulnerabilities and assessment of the risk to the network, is a critical part of both the security and business landscape that any company’s security team needs to understand and implement for long-term success. But companies that rely totally on signature-based defenses can be helpless against many threats. Find out how to reduce risks by identifying and eliminating weaknesses.

unsuccessful integration of acquisition   Read More

Busting Out of the Inbox: Five New Rules of 1to1® E-mail Marketing


Situating e-mail in a multichannel marketing plan is more complicated than it used to be. Where exactly does e-mail fit in the world of blogs, vlogs, and podcasts—where MSN, Google, and Yahoo! call the shots? Marketers need to understand which strategies and tactics are most effective to ensure that their e-mails will be delivered, opened, and acted upon.

unsuccessful integration of acquisition   Read More

IDC and Webroot Present: Securing Enterprise Environments against Spyware-Benefits of Best-of-breed Security


The threat of spyware has risen to epidemic levels for many information technology professionals trying to protect their users and network. In response, many security vendors are creating anti-spyware software to seek out spyware and eradicate it from the enterprise network. Webroot's Spy Sweeper Enterprise is just such a product.

unsuccessful integration of acquisition   Read More