X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 public database

Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » public database

EXE Technologies Begins Life In The Public Eye


Undaunted by its negative bottom line, EXE resurrected plans for an IPO this year, proceeds of which will be used to fuel its newfound growth.

public database  Begins Life In The Public Eye S. McVey - August 7, 2000 Vendor Genesis A supply chain execution vendor specializing in warehouse management and Internet fulfillment, EXE Technologies emerged from the merger of Neptune Systems, Inc. and Dallas Systems, Inc. in mid 1997. Dallas Systems had built its WMS around the needs of retail and wholesale distribution companies while Neptune brought expertise in third party logistics (3PL) to the combination. Dallas Systems'' EXceed was offered on IBM mainframe and Read More

SAP's Dr. Peter Barth on Client/Server and Database Issues with SAP R/3


To address questions for a TEC customer, we interviewed Dr. Peter Barth, Technology Marketing Manager for SAP AG in Walldorf, Germany. The conversation covered issues in the areas of client/server architecture and database management used by the SAP R/3 Enterprise Resource Planning suite of products.

public database  traffic. SAP does support Public Key Encryption products such as Entrust. Customers who do not use network encryption could be at high risk. Question: Is it possible to restore only a portion of the database schema using database tools? Dr. Barth: It is possible, but the DBA must be clear on what they are doing because the referential integrity is program enforced within SAP. It isn''t possible to use database referential integrity because database referential integrity can not enforce business logic. For Read More

Nothing Succeeds Like Success(Factors) - Part 3


Part 1 of this series introduced SuccessFactors, a public provider of software as a service (SaaS) talent management solutions. The article first analyzed the vendor’s evolution from its traditional People Performance realm to the seemingly more opportune Business Execution (BizX) province. Then the article talked about SuccessFactors’ diverse product editions (tailored to

public database  model for access to public and private goals within their organization. This approach also allows SuccessFactors to interface with services across a  service oriented architecture (SOA)  environment. Another key feature of BizX’s application architecture is its ability to understand the hierarchical structure of employee relationships within an organization. This is essential for a performance and talent management application, but difficult to accomplish using traditional flat table-based database Read More

Software Technologies Corporation (STC) Prepares to go Public


Enterprise Application Integration vendor Software Technologies Corp. (STC) announced the filing by the company of a Registration Statement with the Securities and Exchanges Commission relating to the proposed initial public offering of up to $100 million of its common stock.

public database  to the proposed initial public offering of up to $100 million of its common stock. STC will use the net proceeds from the proposed offering for general corporate purposes and to repay $10 million under a long-term note. All shares are being sold by the company. STC, located in Monrovia, is a leading provider of e-Business integration software that enables the seamless flow of information within and among enterprises on a global basis. STC''s comprehensive e*Gate software suite provides companies with a Read More

UNIT4 Continues Its Success in the Canadian Public Sector


Medicine Hat becomes the latest Canadian municipality to choose UNIT4 Agresso ERP. Read TEC analyst Aleksey Osintsev's take on the deal.

public database  ERP, thanks to the public nature of municipality management in Canada. So, the municipality installed Oracle’s JD Edwards One World ERP package back in 1999 and upgraded it in 2002. As the city stated in 2012, “for 12 years the system has provided strong support for daily processing and management decisions, but the system cannot be upgraded to meet the existing standards of database processing and operating system functionality”. So, mainly due to “incompatibilities in data software” the city Read More

New Release of KANA's LAGAN Enterprise Customer Service Suite for Public Sector


KANA Software, Inc. has announced a new version of its LAGAN Enterprise customer service suite for public sector organizations. The press release underlines three major additions as well as a number of enhancements. LAGAN Knowledge Management—introduces a new knowledge platform, user interface, and search tool. LAGAN Employee Mobile—allows public sector workers to easily view, accept

public database  Customer Service Suite for Public Sector KANA Software, Inc. has announced a  new version of its LAGAN Enterprise customer service suite  for public sector organizations. The press release underlines three major additions as well as a number of enhancements. LAGAN Knowledge Management —introduces a new knowledge platform, user interface, and search tool. LAGAN Employee Mobile— allows public sector workers to easily view, accept, update, and close cases while in the field. The application uses Read More

E*Trade Ignores Private Security Warning, But Public Hullaballoo Gets Response


E*Trade was notified about a cookie vulnerability in August, but the correction wasn't made until after the problem became public.

public database  Private Security Warning, But Public Hullaballoo Gets Response E*Trade Ignores Private Security Warning, But Public Hullaballoo Gets Response P. Catz - September 27, 2000 Event Summary In late August computer programmer Jeff Baker discovered scenarios in which cybercriminals could compromise the password security of the users of E*Trade, an online securities trading portal. Mr. Baker reported these scenarios to the Director of System Security, and Manager of Security Threat Analysis at E*Trade in an Read More

Informix Holds Fire Sale on Linux Database


Informix announced its continued commitment and investment to the Linux community with the release of Foundation.2000 and Cloudscape 3.0 on Linux.

public database  Holds Fire Sale on Linux Database Event Summary NEW YORK, February 2, 2000-Informix Corporation (NASDAQ: IFMX), the technology leader in the software infrastructure for the i.Economy and a leading Linux vendor, at LinuxWorld 2000 announced its continued commitment and investment to the Linux community with the release of Foundation.2000 and Cloudscape 3.0 on Linux. Informix committed to bring all core server products to the Linux platform, including its business intelligence suite. Linux Read More

Syncsort Sigma Manages Database Aggregates


Syncsort, a software vendor with years of experience in the sorting of data, has released a new product called Sigma™, which is designed to produce aggregated data within data warehouses to improve response time and reduce database load. The importance of aggregation in a data warehouse cannot be underestimated.

public database  Sigma Manages Database Aggregates Syncsort Sigma Manages Database Aggregates M. Reed - July 25, 2000 Event Summary Programmers and administrators of large databases and data warehouses can create, manage and process data aggregates with speed, ease and accuracy with a new software product unveiled by Syncsort Incorporated. Called Sigma, the vendor states that the product combines a high-performance data aggregate engine with an intuitive graphical user interface. By simplifying aggregation Read More

Blade Computing and the Public Sector


Across the public sector, cost savings will be decisive when considering an investment in blade computing. The decision can be made on a fairly straightforward cost basis—does the investment pay back? But blade computing also offers advantages in terms of the ability to respond to business needs, which should make it a core part of public sector IT strategy.

public database  Computing and the Public Sector Across the public sector, cost savings will be decisive when considering an investment in blade computing. The decision can be made on a fairly straightforward cost basis—does the investment pay back? But blade computing also offers advantages in terms of the ability to respond to business needs, which should make it a core part of public sector IT strategy. Read More

Application Performance Starts with Database Performance Analysis


Application performance management (APM) tools have helped create a new corporate culture of continuous performance monitoring and improvement. But these tools generally tend to focus on application-level issues, while database and infrastructure-related issues go undetected.

This white paper examines the gap in the monitoring capabilities of traditional APM tools, which so often fail to identify the true root of problems, particularly as production performance issues often lie in the relational databases that run the majority of enterprise applications.

This paper also introduces a subcategory of APM solutions—application database performance management (ADPM) tools—that aims to give a unified perspective of a system’s overall performance. Read the report to discover the benefits of putting an ADPM tool in place and help you build a business case.

public database  Performance Starts with Database Performance Analysis Application performance management (APM) tools have helped create a new corporate culture of continuous performance monitoring and improvement. But these tools generally tend to focus on application-level issues, while database and infrastructure-related issues go undetected. This white paper examines the gap in the monitoring capabilities of traditional APM tools, which so often fail to identify the true root of problems, particularly as Read More

About WebFirst


WebFirst enables customers to dynamically access the CustomerFirst database utilizing standard web browsers. Through a secure portal on a corporate web site, customers can perform a variety of functions related to incident reporting, as well as customer and contact information.

public database  WebFirst WebFirst enables customers to dynamically access the CustomerFirst database utilizing standard web browsers. Through a secure portal on a corporate web site, customers can perform a variety of functions related to incident reporting, as well as customer and contact information. Read More

Oracle Database 11g Product Family


This white paper provides an overview of the various feature sets available within the Oracle Database family of products. Built using a reliable database architecture, these products provide the necessary foundation to successfully deliver more information with higher quality of service and efficiently manage change within the environment to deliver better value.

public database  Database 11g Product Family This white paper provides an overview of the various feature sets available within the Oracle Database family of products. Built using a reliable database architecture, these products provide the necessary foundation to successfully deliver more information with higher quality of service and efficiently manage change within the environment to deliver better value. Read More

Database Activity Monitoring: Intrusion Detection and Security Auditing


At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable.

public database  Activity Monitoring: Intrusion Detection and Security Auditing At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable. Read More

Case Study: Asset Management Software Provides a Strategic Solution for the Chicago Public School District


As part of its effort to improve literacy in grades K-3, the Chicago Public Schools District needed to manage thousands of personal digital assistants (PDAs) and other devices to ensure distribution to the right teachers at the right institutions—and under serious time constraints. The schools deployed an asset-tracking solution that enabled real-time tracking, as well as budget planning with depreciation. Learn more.

public database  Solution for the Chicago Public School District As part of its effort to improve literacy in grades K-3, the Chicago Public Schools District needed to manage thousands of personal digital assistants (PDAs) and other devices to ensure distribution to the right teachers at the right institutions—and under serious time constraints. The schools deployed an asset-tracking solution that enabled real-time tracking, as well as budget planning with depreciation. Learn more. Read More