Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Notes from the TDWI Conference in San Diego, (Day 1) » The TEC Blog
Notes from the TDWI Conference in San Diego, (Day 1) » The TEC Blog TEC Blog TEC Home About TEC Contact Us About the Bloggers Follow TEC on Twitter RSS Discussing Enterprise Software and Selection --> Fast, Accurate Software Evaluations TEC helps enterprises evaluate and select software solutions that meet their exacting needs by empowering purchasers with the tools, research, and expertise to make an ideal decision. Your software selection starts here. Learn
: agile methodology, Business Intelligence Solutions, data warehousing, Microsoft SQL SErver, PowerPivot, TDWI conference, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Analyst / SCT Share Vision at SCT User Conference
The SCT User Conference featured industry analysts from Gartner Group, AMR Research and Meta Group each sharing its vision for the future of enterprise systems with the audience. Customers, in special interest groups and in presentations discussed their success with SCT’s products. SCT showed both their existing product set plus their vision for the future with a series of product announcements and prototypes of future products.
: Analyst / SCT Share Vision at SCT User Conference Analyst / SCT Share Vision at SCT User Conference P. Catz - May 21, 2001 Read Comments P. Catz - May 21, 2001 Event Summary The SCT User Conference, held in Toronto featured industry analysts from Gartner Group , AMR Research and Meta Group each sharing their vision for the future of enterprise systems with the audience. Customers, in special interest groups and in presentations discussed their success with SCT s products. SCT showed both their existing
Identix Leads Biometric Authentication
Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon™ for Windows 2000™ and features biometric identification and authentication, BIOS level security, single sign-on and multi-factor security.
: Identix Leads Biometric Authentication Identix Leads Biometric Authentication L. Taylor - January 26, 2002 Read Comments Featured Author - Laura Taylor - January 27, 2002 Vendor Background Perhaps the most exciting product released at last Comdex, was the Identix DFR-300 Fingerprint Scanner. Implemented in Compaq, Dell, and Toshiba laptops, the hardware fingerprint scanners are packaged with BioLogon for Windows 2000 and features biometric identification and authentication, BIOS level security, single
The 2006 ECM West Conference: A Trial from AIIM
The Association for Information and Image Management recently held a conference to educate organizations on the latest content and information management technologies. Among the key topics addressed were emerging trends in enterprise content management and the future of the Internet.
: The 2006 ECM West Conference: A Trial from AIIM The 2006 ECM West Conference: A Trial from AIIM Hans Mercx - December 15, 2006 Read Comments The Association for Information and Image Management (AIIM) hosted its first enterprise content management (ECM) West conference this year in San Jose, California (US) to educate organizations on the latest technologies in content and information management and to provide a forum where vendors and peers can interact. This conference is a trial for AIIM, as in
What Are Biometrics?
The field of biometrics has recently become a hotbed of controversy and discussion between privacy groups, law enforcement agencies, and the general public at large. Recent advances in technology have enabled the stuff of science-fiction movies from Hollywood to become a reality. Learn more about the pros and cons of using biometric technology.
: and cons of using biometric technology. What Are Biometrics? style= border-width:0px; /> comments powered by Disqus Source: Voice Security Systems Inc. Learn more about Voice Security Systems Inc. Readers who downloaded this white paper also read these popular documents! Best Practices for ERP Implementation Practical Guide to ERP for Recipe/Formula-based Manufacturers Mobile Device Management: Your Guide to the Essentials and Beyond Payroll Services Checklist Delivering on the Promise of Mobile
5/6/2010 3:01:00 PM
Speeding Time to Market: Reducing Product Introduction Time and Costs with Product Information Management
As product lifecycles continue to shrink and product complexity increases, reducing the time it takes to introduce new products has become a strategic imperative for companies. Businesses must have clean and accurate product data that’s consolidated across sales channels and back-end systems. Find out why product information management and master data management platforms are key to getting products to market faster.
: product information management, master data management, mdm, pim, master data management strategy, master data management software, master data management tools, product information management software, master data management architecture, what is master data management, master data management solutions, master data management mdm, mdm master data management, master data management definition, master data management vendors, master data management best practices, product information management system, product master data management, master data management conference, master data management .
2/2/2011 8:25:00 AM
About Big Data
TEC analyst Jorge Garcia discusses the key issues surrounding big data, the different ways to manage it, and the major vendors offering big data solutions. There may not be a consensus with respect to just how big
: big data, big data management, big data analytics, big data analytics appliance, big data file and database management systems, structure big data, big data summit, big data conference, google big data, gigaom big data, big data 2011, big data conference 2011, big data base, big data apache, big data companies, big data low latency, r big data, big data camp, structure big data 2011, big data marketing, big data hadoop, hadoop big data, big data sets, data big, clouds big data and smart assets, big data analysis.
11/18/2011 2:08:00 PM
Show Me the (Hidden) Money » The TEC Blog
Show Me the (Hidden) Money » The TEC Blog TEC Blog TEC Home About TEC Contact Us About the Bloggers Follow TEC on Twitter RSS Discussing Enterprise Software and Selection --> Fast, Accurate Software Evaluations TEC helps enterprises evaluate and select software solutions that meet their exacting needs by empowering purchasers with the tools, research, and expertise to make an ideal decision. Your software selection starts here. Learn more about TEC s software
: Acuity, apics, Conference, downturn, hidden money, lean, Six Sigma, theory of constraints, value stream mapping, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Collaboration 2.0: Taking Collaboration to the Next Level: From the E-mail and Document-centric World of Enterprise 1.0 to the People-Centric World of Enterprise 2.0
Most business collaboration continues to be conducted via e-mail and shared folders, but forward-looking organizations are increasingly considering socially oriented and real-time collaboration solutions to instantly and seamlessly increase productivity between employees, suppliers, customers, and stakeholders. This white paper discusses new products, services, and technologies entering the enterprise collaboration space.
: Collaboration 2.0: Taking Collaboration to the Next Level: From the E-mail and Document-centric World of Enterprise 1.0 to the People-Centric World of Enterprise 2.0 Collaboration 2.0: Taking Collaboration to the Next Level: From the E-mail and Document-centric World of Enterprise 1.0 to the People-Centric World of Enterprise 2.0 Source: IBM Document Type: White Paper Description: Most business collaboration continues to be conducted via e-mail and shared folders, but forward-looking organizations are
5/9/2011 10:12:00 AM
Lexiguard: The Coming Adobe Acrobat of Encryption
A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price, even novice Internet users can master the art of sending secure encrypted data. As security awareness heightens, Lexiguard may soon become as ubiquitous on desktops as Adobe Acrobat.
: Lexiguard: The Coming Adobe Acrobat of Encryption Lexiguard: The Coming Adobe Acrobat of Encryption L. Taylor - January 31, 2000 Read Comments Event Summary Last week at RSA Conference 2000, Lexias, Inc. unleashed a desktop encryption product which someday could become the defacto desktop encryption application of choice if Lexias plays their cards right. Known as Lexiguard 1.0, this desktop PKI solution is easy to install, easy to use, and may be one of the hottest new security products
Microsoft Releases RC1 of the Exchange 2000 Conference Server
Microsoft's Exchange 2000 Conferencing Server enables knowledge workers to collaborate with anyone, anywhere by providing data, video, and voice conferencing across intranets and the Internet.
: Microsoft Releases RC1 of the Exchange 2000 Conference Server Microsoft Releases RC1 of the Exchange 2000 Conference Server P. Hayes - March 8, 2000 Read Comments Event Summary SAN FRANCISCO - Feb. 22, 2000 - Microsoft Corp. announced Microsoft Exchange 2000 Conferencing Server, the newest member of the Exchange 2000 product line, as well as the first release candidate of Exchange 2000. Exchange 2000 Conferencing Server enables knowledge workers to collaborate with anyone, anywhere by providing data,
White Paper Newsletters