X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 identity selector

Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » identity selector

Liferay


Liferay is an open source company that provides both free documentation and paid service to users of its software. Liferay Portal, an enterprise Web platform, is designed for building business solutions that combine social networking, portals, publishing, content-based collaboration, and identity management. Liferay Portal Community Edition (CE) is offered through the active community, while Liferay Portal Enterprise Edition (EE) is a commercial offering with updates and full support.

identity selector  publishing, content-based collaboration, and identity management. Liferay Portal Community Edition (CE) is offered through the active community, while Liferay Portal Enterprise Edition (EE) is a commercial offering with updates and full support. Read More

How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program


A strong identity management platform plays dual roles: gatekeeper and guardian of business intelligence (BI) and data. Midsize businesses can’t operate effectively without the ability to control access to their networks and business systems. And, many midsize companies must report on this information for compliance purposes. Learn about the factors driving midsize companies toward stronger identity management systems.

identity selector  Ensure Compliance with an Identity Management Program How Midsize Businesses Can Reduce Costs, Secure Data, and Ensure Compliance with an Identity Management Program If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Oracle has been helping customers like you manage your business systems and information with reliable, secure, and integrated technologies. Source : Oracle Resources Related to Identity management : Identity management Read More

Seagate Software 'Crystallizes' Its New Name: Crystal Decisions


Seagate Software has announced a new chapter in its corporate history by changing its name to Crystal Decisions. Crystal Decisions is an information infrastructure company that is a market leader in business intelligence, specifically for query and reporting tools. The new name reflects that of its flagship product, Crystal Reports.

identity selector  us a cohesive, instantly-recognizable identity. With the world''s most popular design tool for high-performance reporting, a globally scalable web information delivery infrastructure, and a sophisticated application development technology for advanced business analysis-Crystal Decisions'' market leadership is clear. Market Impact   Out with the old and in with the new So why would Seagate want to change its name? (And spend all that money replacing logos, marketing collateral, web site designs, and Read More

Yet Another Branding Debacle (This Time, It's ERP for Services)


Organizations providing billable services to their clients can benefit from an enterprise resource planning solution. But what makes ERP for services different from solutions known as product portfolio management for professional services automation? And which is best for your organization?

identity selector  one branding image or identity to a new one, can also be called product scope creep, feature creep, or even featuritis, depending on the software programming or design or the marketing situation in question (in the IT industry, the evocative software bloat has been used to describe a similar phenomenon). ERP for services, a relatively new addition to the ERP spectrum, has been creeping into the picture as some traditional ERP vendors are making efforts to appeal to non-manufacturing markets. Read More

Commerce One Conducts Its Soul-Searching Metamorphosis Part Two: Challenges and User Recommendations


Commerce One is seemingly stuck with yet another identity crisis being a novice provider of a Web services-based integration platform and being a still fledgling provider of business application suite built on top of that platform, and which has not yet successfully competed in the SRM arena.

identity selector  stuck with yet another identity crisis being a novice provider of a Web services-based integration platform and being a still fledgling provider of business application suite built on top of that platform, and which has not yet successfully competed in the SRM arena. The problem also stems from the fact that these two markets are very different, and focusing on one dilutes the effort of focusing on the other. Deep functionality and domain expertise characterize SRM products coming from pure players like Read More

Catalyst International Bit by Y2K Bug


"Catalyst International, Inc. (NASDAQ: CLYS), a leader in warehouse management software, today announced that due to longer sales cycles of prospective customers, revenues are expected to be lower than projected resulting in a third quarter loss. The delay in signing new contracts appears to result from a general slow down in procurement and contracting decisions by tier one customers as Y2K approaches. Further, sales of new accounts were hindered for several months between Catalyst's pre-release announcement regarding the "potential strategic partner" and the actual press release announcing the SAP/Catalyst Advanced Strategic Alliance du

identity selector  issues and uncertainty over identity of the new business partner. Fig. 1 Market Impact Y2K is too often a convenient scapegoat for poor earnings. Since assuming control in 1Q97, President and CEO Sean McGowan has managed to reverse Catalyst''s downward trend, albeit with some difficulties. McGowan''s appointment came on the heels of a $7.1 million loss in fiscal 1996, which resulted largely from two factors: An unsuccessful attempt at utilizing purchased development of ISI (Information Strategies, Inc.) Read More

Brave New World-Biometrics in HR


Human resources (HR) professionals often have to deal with errors in recording employees’ effectiveness while accomplishing their jobs. My colleague Ted Rohm gives an overview in this recent blog post of how biometrics can help with these HR challenges. He makes the case that biometrics technology is an option worth considering for certain aspects of business operations. As Ted mentions in his

identity selector  organizations with high turnover. Identity theft is a common crime that many governments are trying to prevent by applying harsh punishments to the criminals involved and by increasing security measures for institutions who handle private information. Many people change jobs several times over their lifetimes, and having people’s biometric data duplicated on the servers of many employers could open the door for hackers to take ahold of that information and use it for criminal purposes, as some Read More

Case Study: Ping Identity


Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate time to market for its leading Web security product. When its first outsourcing choice didn’t offer enough Agile development expertise, Ping found another solution that helped reduce costs by 46 percent and doubled in-house performance in key areas. Learn more.

identity selector  Study: Ping Identity Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate time to market for its leading Web security product. When its first outsourcing choice didn’t offer enough Agile development expertise, Ping found another solution that helped reduce costs by 46 percent and doubled in-house performance in key areas. Learn more. Read More

Flexible Customer Data Integration Solution Adapts to Your Business Needs


Siperian's master data management and customer data integration (CDI) solutions allow organizations to consolidate, manage, and customize customer-related data. The type of CDI hub implemented depends on the CDI environment's maturity, requirements, and alignment with an organization's internal processes.

identity selector  architectural styles, namely Master Identity , Master Data Management , and Operational Views , to meet the varied requirements of an organization''s customers based on the maturity of its CDI environment. These styles provide organizations with different benefits based on the way these organizations choose to apply CDI. Organizations may want a total approach to CDI immediately; that is, to manage their organization-wide CDI and MDM initiatives from the start. However, the implementation of a CDI Read More

Aurionpro’s SCMProfit for the Logistics Industry


Technology Evaluation Centers (TEC) had the occasion recently to speak with Aurionpro Solutions’ president of supply chain management (SCM), Atul Kaushal, and director of SCM, Dhananjay Jadhav, to learn more about the company and its solution. Aurionpro is a $100 million (USD) Mumbai, India–based software vendor, with a US base in San Ramon, California. It is a publicly owned company trading on

identity selector  an  Oracle  partner for identity and access management. Aurionpro’s focus in the supply chain area is its SCMProfit solution, targeted to freight forwarders and third-party logistics providers (3PLs), providing “visibility, control, collaboration, and execution” from order fulfillment through to logistics execution. The solution is built on the Microsoft dot.net/SQL Server platform, and Aurionpro is rolling out a  Microsoft Azure –based version. TEC will be taking a closer look at Aurionpro in Read More

Employee and Manager Self-Service: A Virtual Chameleon in the Workplace


In order for employee self-service (ESS) and manager self-service (MSS) technology to be effective, it must serve multiple purposes for multiple business units while blending seamlessly with existing systems. This white paper provides insight into how ESS

identity selector  Self Service Portal | Identity Manager Self Service | ESS Employee Self Service | ESS Employee Benefits Self Service | ESS Employee Manager Self Service | ESS Employee Self Service Benefits | ESS Employee Self Service Center | ESS Employee Self Service Home Page | ESS Employee Self Service Link | ESS Employee Self Service Login | ESS Employee Self Service Module | ESS Employee Self Service New | ESS Employee Self Service Online | ESS Employee Self Service Page | ESS Employee Self Service Payroll | ESS Emp Read More

How To Mitigate Holiday Cybercrime


Shop.org, and the Boston Consulting Group, reported that sales during the 1998 holiday season grew by 230 percent. With today's tools, just about anyone can throw up a professional looking website, and make claims about tight security. How can you protect yourself from fly-by-night internet sites, and malicious cyber sleuths who are ready and waiting to "sniff your password and credit card information while transaction is in process? There no way to mitigate every single riskhowever common sense can do wonders helping eliminate e-tail dangers. It pays homework before shopping online.

identity selector  remain anonymous and evade identity disclosure. The lack of proximity boundaries created by the internet further complicates the situation. A transaction with someone half-way around the world may appear as close as a transaction with someone in the next office. Figure 1 documents the 10 most common internet frauds. User Recommendations Ensure that any website that collects personal or credit card information from you has a Privacy Statement explaining what information about you is collected by their Read More

Encryption Made Easy: The Advantages of Identity-based Encryption


The growing list of regulations for protecting data in virtually every size organization and industry means enterprises are being pressed hard to find effective, affordable, encryption technologies. Identity-based encryption has a greater advantage over traditional approaches to public key cryptography. It ensures the security of encrypted e-mails while minimizing the burden on end users.

identity selector  Easy: The Advantages of Identity-based Encryption The growing list of regulations for protecting data in virtually every size organization and industry means enterprises are being pressed hard to find effective, affordable, encryption technologies. Identity-based encryption has a greater advantage over traditional approaches to public key cryptography. It ensures the security of encrypted e-mails while minimizing the burden on end users. Read More

Is Instant Messaging (IM) Threatening Your Company's Security?


There is a way to use IM securely in the workplaceand you can find out how in bullet-proofing instant messaging.

identity selector  key data; financial loss; identity theft; copyright infringements; and compliance violations. Don''t wait for disaster to strike. And you don''t have to ban a tool employees find extremely useful for getting their jobs done. There is a way to use IM securely in the workplace—and you can find out how in Bullet-proofing Instant Messaging . Learn how to protect yourself , your employees, and your company''s integrity by blocking IM security threats. Download your PDF copy of Bullet-proofing Instant Messaging Read More

Case Study: ByTec


Bytec, Inc., a supplier of electronic and mechanical assemblies for the automotive sector, needed a system to allow original equipment manufacturer (OEM) customers to trace a particularly complex part. Learn how ByTec chose a solution that provided each part with a unique identity, complete with full traceability through the entire manufacturing process, enabling OEMs to identify faults, and avoid warranty costs.

identity selector  part with a unique identity, complete with full traceability through the entire manufacturing process, enabling OEMs to identify faults, and avoid warranty costs. Read More