X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 vickie smith


Announcing Agilisys (Formerly SCT’s Process Manufacturing & Distribution Business) - Finally Fully Focused On Process Manufacturing
The new independent company will certainly benefit from having control of its own financial destiny, being able to make decisions based upon its own needs and

vickie smith  Catalyst program includes products, services and prepackaged integration to a company's existing ERP backbone. Customers Agilisys customer base features a strong selection of both large and mid-market companies. It includes household names like Coca Cola Fountain , Molson Brewing , Glaxo Smith-Kline , Safeway Inc. and a selection of smaller companies like Horizon Organic , Spraylat and Basic American Foods . The company's new president has been aggressively visiting the existing customer base in an

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » vickie smith

If There's One Thing CRM Tells Us: Don't Do PLM the Same Way


Product lifecycle management (PLM) doesn't work, but it should. Industry's general approach and attitude to PLM mimics the early days of customer relationship management (CRM) adoption, and lessons from that experience should help when tackling the "ifs" and "hows" of PLM investment.

vickie smith   Read More

Appointment Scheduling - Achieving the Positive Ripple Effect Part 2: A Solution


Integration of the appointment scheduling system with other systems is necessary for maximum benefit.

vickie smith   Read More

Retailers Join Forces for a "Make or Break" Attempt in Their Competitive Landscape


Today's competitive retail landscape has lead to mega-mergers between some of the oldest retailers in the US: Kmart and Sears. Before the technical issues of merging disparate supply chain systems can be addressed, these giants first had had to get their business "housekeeping" in order.

vickie smith   Read More

Are Spreadsheets Sabotaging Your Profits?


Due to their limitations, using spreadsheets to manage mission-critical business functions is an unacceptable risk. The requirements for finding the right inventory in the right place at the right time are being hampered by spreadsheet forecasts based on inappropriate source data. Packaged software with inventory management and collaborative capabilities will give your supply chain a competitive advantage. Learn how.

vickie smith   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

vickie smith   Read More

The Lexicon of CRM - Part 2: From J to Q


C.R.M. itself is an acronym, standing for Customer Relationship Management. This is part two of a three-part article to provide explanation and meaning for most of the common CRM phraseology. Here, in alphabetical order, we continue the Lexicon of CRM.

vickie smith   Read More

Cornerstone OnDemand—SaaS Products, But Well Grounded


In this post, TEC research analyst Raluca Druta highlights talent management specialist Cornerstone OnDemand (CSOD). Get a close-up look at the CSOD’s SaaS offerings and some of the benefits customers can expect from the customer-focused vendor.

vickie smith   Read More

What Good Is Information If Nobody Sees It?


Keeping detailed historical information is a great idea in theory, but how can it be merged with current data to enable split-second decisions? Two companies partner to solve a significant problem in e-commerce.

vickie smith   Read More

Freeware Vendor's Web Tracking Draws Curses


The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was discovered and announced by the same security consultant who discovered, in March of 1999, that Microsoft Windows was inserting unique serial numbers into many documents created within Office 97 programs like Word and Excel.

vickie smith   Read More

Deltek and Maconomy: Gearing Up for the Global Service Economy?


Both the “old” Deltek (pre-2005) and “new” Deltek (from 2005 on) have not been strangers to acquisitions, but these were largely well thought-out and appetizing (“nip in”) purchases of smaller companies that had either an attractive piece of technology or install base (or both). However, in early June 2010, immediately after its Insight 2010 user conference, Deltek

vickie smith   Read More

Lombardi Software Teamworks 7.0 for Business Process Management Certification Report


Lombardi Software's business process management (BPM) system, Teamworks 7.0, is now TEC Certified. The certification seal is a valuable indicator for organizations who rely on the integrity of TEC’s research services for assistance with their software selection projects. Download this 28-page TEC report for product highlights, competitive analysis, product analysis, and in-depth analyst commentary.

vickie smith   Read More

Social Engineering Can Thwart the Best Laid Security Plans


There are a lot of different social engineering techniques, but they all have the same basic idea. The trick behind social engineering is to get the user to give up valuable information without them suspecting anything.

vickie smith   Read More

Infor24: Demystifying Infor’s Cloud Strategy - Part 1


Anyone that is still vociferously doubting and denying the future of cloud computing and its near-mainstream nature will sound as strange and nutty as some US Senate hopefuls that still proudly deny evolution and climate change (while admitting to “dabbling with witchcraft” in the not-too-distant past). In fact, can anyone name a renowned enterprise resource planning (ERP

vickie smith   Read More