X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 magazine agent


An Interview with Shoshana Zuboff and James Maxmin
Many corporations have failed the customer; they focus on transactions, rather than customers. Ann Grackin recently talked to Shoshana Zuboff and James Maxmin

magazine agent  View, ChainLink Research's on-line magazine, read by over 150,000 supply chain and IT professionals each month. Thought-provoking and actionable articles from ChainLink's analysts, top industry executives, researchers, and fellow practitioners. To view the entire magazine, click here . About the Author For more than two decades, Ann Grackin, Chief Executive Officer, has been on the frontlines of the Supply Chain Management technology and e-commerce frontier, leading global strategy and technology

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » magazine agent

Application Single-Sign On: Netegrity, Securant, or Evidian?


As security breaches become increasingly more frequent, minimizing user access to back-end systems and web applications without impacting legitimate usage is more important than ever before.

magazine agent   Read More

Vulnerability Management Buyer’s Checklist


Choosing a solution for vulnerability management (VM) is a critical step toward protecting your organization’s network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily deluge of new vulnerabilities that threaten security. This 12-point short list of considerations can help you determine what solutions will work best for your organization.

magazine agent   Read More

Legacy Single Sign-On: Novell, Evidian, IBM, PassGo, or Computer Associates?


As the complexity of enterprise systems increases, users are often forced to remember more and more passwords. As the demand on users increases, many users choose to write down their passwords, and by doing so, jeopardize security.

magazine agent   Read More

The Wheres of Electronic Procurement


An overview of one of the central issues facing a deployment of e-procurement: Who controls the software?

magazine agent   Read More

10 Errors to Avoid When Commissioning a Data Center


Data center commissioning requires tight coordination between vendors, facilities, IT departments, engineers, the commissioning agent, and others. Managed properly, commissioning can deliver an unbiased evaluation of whether a new data center will succeed or not. Managed poorly, it can lead to problematic data center performance issues. Learn 10 common data center commissioning mistakes, and find out how to avoid them.

magazine agent   Read More

Workday Tackles Big Data in the Cloud


At the recently held Workday Rising 2012 conference, Workday unveiled big data analytics for its users in human resources (HR) and financial departments. Workday plans to deliver big data capabilities (with no hardware required) to map and process external data sources and streams. One of Workday's design principles was to provide embedded contextual (relationship-aware) and fast in

magazine agent   Read More

The Power of Knowledge -- Knowledge is Power (Part 2)


Part 1 of this blog series introduced the need for knowledge management (KM) software applications as part of a more comprehensive and strategic service management (SSM) suite. One such broad SSM suite has been offered by Servigistics. Servigistics’ Service Knowledge Management (SKM) solution, the newest module within Servigistics SSM, is designed to meet the requirements of the technical

magazine agent   Read More

Software for Real People Part One: MindManager Feature and Functions


Many software applications are indispensable for the operation and management of the enterprise. They, however, may actually stifle creativity--arguably the most valuable aspect of human capital--by requiring the user to adapt to the tool rather than have the tool supporting the user.

magazine agent   Read More

RFID in Healthcare--A Whole Industry of Value


This article talks about recent and expected FDA regulations and how RFID can help meet those requirements while improving supply chain performance.

magazine agent   Read More

Sendmail Matures


In 1981, Eric Allman developed sendmail to route messages between disparate mail systems. Two years later, in 1983, sendmail version 4.2 was shipping with 18 different vendor UNIX systems.

magazine agent   Read More