X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 used books abe


Alibris Charged with Intercepting Email
Internet book dealer Alibris has agreed to pay a $250,000 fine after being charged with 10 counts of intercepting electronic communications.

used books abe  Massachusetts. Many book dealers used Valinet as an ISP. Incoming Valinet email intended for local bookdealers was filtered for source Amazon.com and was captured in log files under direction from the original Alibris/Interloc management team. Market Impact The case was heard before Judge Michael A. Ponsor in the U.S. District Court in Springfield, Massachusetts. A maximum fine of $250,000 for each count means that Alibris could have ended up paying $2.5million in penalties. Earlier this year, Forbes

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Radio Frequency Identification (RFID)

Radio frequency identification (RFID) criteria cover tags and storage devices, readers, wireless hubs and servers, and the middleware necessary for evaluating an RFID system deployment. RFID systems are used in different situations that require the tracking of unique items. RFID tags, in the context of enterprise resource planning and supply chain management, make items visible from manufacturing through distribution. RFID tags may be used to carry basic information such as an address, to more complex information used at different stages of an assembly line.  

Evaluate Now

Documents related to » used books abe

Customer Relationship Malpractice


Although malpractice is usually a term used in medicine, its definition (“any instance of improper professional conduct”) shows that the term can be used in any profession. In my opinion, malpractice can also be found in customer relationship management (CRM).  It can result in financial damage (lost sales, penalties for not delivering on time, etc.) or loss of confidence, which can jeopardize the

used books abe   Read More

Why a Call-centric CRM?


Traditional CRM systems have evolved to be used by the entire company (sales, marketing, customer service, accounting, and management), but in doing so they have lost their focus on the primary user--sales. As such, salespeople get stuck with a CRM system that does not increase sales activity, but instead, bogs them down and decreases activity, which subsequently decreases sales. Download this report to learn the criteria that should dominate the decision as to which CRM should be used. This report is for sales people, sales managers, VPs, IT, customer service and general management (CEO, CTO, CFO). It should be required reading for anyone that is part of the CRM selection team.

used books abe   Read More

Captured by Data


The benefits case for enterprise asset management (EAM) has been used to justify huge sums in EAM investment. But to understand this reasoning, it is necessary to explore how asset data can be used to further the aims of maintenance.

used books abe   Read More

Data Sheet: Symplified Access


Your online business relationships change constantly. Managing the web identities used in these relationships—for employees, consultants, partners, customers, and vendors—is critical to secure growth. But there’s a way to remove the cost and complexity from securing online identities. Learn about a solution that can deliver identity infrastructure on demand, removing the complexity and costs of legacy identity solutions.

used books abe   Read More

POS-Connect: Point of Sale (POS) Systems Competitor Analysis Report


A point-of-sale (POS) system helps retailers automate transactions. POS solutions are used in retail stores where sales associates must enter sales, refunds, layaways, transfers, etc. POS systems typically consist of some form of electronic cash register and may include credit or debit card processing. Such systems are generally used wherever goods or services are exchanged for monetary value, including the hotel and restaurant industry and in retail environments.

used books abe   Read More

SciQuest and eMolecules Partner to Deliver Reagent Management Solution


In its early days in the 1990s during the first wave of trading exchanges (anyone still remember the crash and burn of Commerce One?), SciQuest used to help manage procurement and inventory management for reagents, those substances or compounds that are added to a system in order to bring about a chemical reaction (or are added to see if a reaction occurs). SciQuest’s Enterprise Reagent Manager

used books abe   Read More

PLM: A New World of (More) Collaboration and Innovation


It used to be the case that PLM was perceived as being principally about CAD tools and 3D drawings and complex technical specs that no one really understood except the geekiest of PLM geeks. This perception was justified, to an extent. After all, PLM and CAD tools can be complicated, engineers and designers tend to operate in highly specialized environments, and there's a common misconception

used books abe   Read More

Realtime Publishers


Realtime’s specialties include content marketing campaigns, white papers, custom publishing, and e-books. Using a real-time publishing method, chapters of the company’s new e-books are published as they are completed.

used books abe   Read More

Adonis: DNS/DHCP for Small to Medium Sized Business


Small to medium businesses have typically built their own domain name system (DNS) and Dynamic Host Configuration Protocol (DHCP) services, used Windows DNS/DHCP, or turned to a hosted service provider for these services. This approach may appear to offer tremendous savings, but contains many hidden costs and risks that are not always apparent until a catastrophic loss of service occurs.

used books abe   Read More

Best Practices for Deploying LAN Security and NAC


Good security used to mean perimeter firewalls and desktop anti-virus software. However, threats don’t come just from outside the company any more. That means security must go beyond the desktop and into the network infrastructure itself. You can stop security breaches at the source—with multimethod and microsecond threat detection—before any damage is done to your network and your business.

used books abe   Read More