X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 wic 1adsl i dg


Thinking Radically: Interview with Gary Cokins
One of the things I love about my job is the opportunity I have to speak with great people. In this installment of Thinking Radically, I speak with Gary Cokins,

wic 1adsl i dg  

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » wic 1adsl i dg

Tentative Unification in Server I/O Architecture Battle


The Next Generation I/O (NGIO) and Future I/O groups have agreed to unify their efforts to develop the next I/O architecture.

wic 1adsl i dg   Read More

Do You Want Your App to Talk Back to You (as a Chatterbox)? - Part 3


In Part 1 of this blog series I admitted to being a late adopter of a sort, in part for not immediately jumping onto the social media bandwagon. In particular, my initial reaction to Salesforce Chatter (a.k.a. Collaboration Cloud) was tepid when it was introduced at the Dreamforce 2009 conference. However, a few months have passed and this period has helped salesforce.com craft the much clearer

wic 1adsl i dg   Read More

What I Hate About HTML5, Multi-Tenancy, and Context-Aware Computing


The terms HTML5, multi-tenancy, and context-aware computing are often-used technology buzzwords representing the current megatrends of mobility, the cloud, and data in enterprise software. Read on to learn the story behind these buzz-words and what to watch out for in your enterprise software research.

wic 1adsl i dg   Read More

Recognition for IP Telephony Open Source Style


I've seen a lot of press about the open source telephony system, Asterisk. Although I haven't worked in the telephony world for some time, I remember what it was like administering those systems years ago in a midsize company that handled large event ticket sales. We ran some systems on OS/2 and for larger ACD call center requirements, Unix. These were not inexpensive systems. If I go to

wic 1adsl i dg   Read More

Be to Be FreeB(i)e


Be Inc. will offer the newest version of its operating system for free later this quarter. Version 5 for the desktop will be available for download to pre-registered individuals.

wic 1adsl i dg   Read More

You Say RFI, I Say Riffy: Why You and Your Vendor Need to Speak the Same Language


When ideas fail, words come in very handy. - Johann Wolfgang von Goethe Software Selection Pitfalls Quick, what’s the number-one pitfall of the software selection process? If you said “budget, buy-in, and boardroom politics,” you’re wrong. Because that’s three pitfalls. We’ll get into those another time. Miscommunication, on the other hand, will torpedo your software

wic 1adsl i dg   Read More

I Want My Private Cloud


Although many organizations are considering reaping the benefits of a cloud computing platform, they have concerns with the handling of sensitive information on a public cloud platform. An alternate option is available, and it means having our own private cloud. This article discusses aspects of private cloud computing and its advantages and drawbacks for organizations considering the adoption of a private cloud strategy.

wic 1adsl i dg   Read More

Protecting Customer Data: How Much is Your Customer’s Trust Worth? Part I: The Business Case for Privacy


Customers are a company’s true source of value creation, and maintaining their trust is imperative. When companies understand this, privacy protection will become an important business tool, rather than just a regulatory requirement (as many companies think of it). Obtaining, using, and especially protecting customer data has never been more important to the strength and positioning of a company’s success.

wic 1adsl i dg   Read More

Metadata Standards in the Marketplace - Why Do I Care? (And Where Does Godzilla Fit In?)


Metadata (“data about data”) is essential for data warehousing. Metadata standards allow different products to interact. Without standards, different vendors’ tools cannot work together seamlessly and the customer’s warehousing effort is greatly complicated.

wic 1adsl i dg   Read More

Liberty Alliance vs. WS-I; J2EE vs. .NET; Overwhelmed .YET? Part 1: Latest Announcements


On one hand, some archrivals (e.g., Microsoft, IBM, and Oracle) are becoming strange bedfellows, while, on the other hand, the others (e.g., Microsoft and Sun) remain set on irreconcilable differences between their technology camps. What are users to do when torn between the hype/promise of Web services and the fear of being outrun by events?

wic 1adsl i dg   Read More