X
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...
 

 quikview


One In-memory Solution Fits All: QlikView Stands Out with Unique Approach and Broad Applicability
In 1993, Swedish-based Qlik Technologies launched a desktop data management solution that soon evolved so that both the application and data resided entirely in

quikview  data management,in-memory,Qlik Technologies,QlikView,QlikTech,QuikView,data discovery,RAM memory

Read More


Discrete Enterprise Resource Planning (Discrete ERP) RFI / RFP Template

Financials, Human Resources, Manufacturing Management, Inventory Management, Purchasing Management, Quality Management, Sales Management, Product Technology Get this template

Read More
Start evaluating software now

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Discrete Manufacturing (ERP)
Discrete Manufacturing (ERP)
The simplified definition of enterprise resource planning (ERP) software is a set of applications that automate finance and human resources departments and help manufacturers handle jobs such as or...

Documents related to » quikview

Web Application Security: The Truth about White Box Testing versus Black Box Testing


Information security managers, quality assurance staff, and developers are faced with the enormous responsibility of keeping Web applications secure from the ever-growing menace of hackers and internal threats alike. So how can they protect sensitive data without exhausting internal resources, overspending the budget, or being forced to use costly manual penetration testing using external consulting firms?

quikview  Application Security: The Truth about White Box Testing versus Black Box Testing Web Application Security: The Truth about White Box Testing versus Black Box Testing If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect your Website against hacker attacks. Source: Cenzic Resources Related to Web Application Security: The Truth about Read More

Project Management Communication: Part 3 of 3


In this final installment of the Project Management Communication series, we look at a vital project management tool. This system has provided visibility to senior management, as well as justification for projects based on the expected value of each product in its planning stage, and in projects both in progress and completed. What Is Project Portfolio Management? Project portfolio

quikview  Management Communication: Part 3 of 3 In this final installment of the Project Management Communication series, we look at a vital project management tool. This system has provided visibility to senior management, as well as justification for projects based on the expected value of each product in its planning stage, and in projects both in progress and completed. What Is Project Portfolio Management? Project portfolio management (PPM) is a resource system that permits an enterprise to collect (or Read More

IT White Papers: The World’s Greatest Cure for Insomnia!


Having trouble sleeping at night? Lots of people are these days, and for good reasons. The economy is in the dumps. Jobs are on the endangered species list. We’re steadily running out of oil. And terrorists are trying to kill us. Now, if all that isn’t enough to keep you awake at 4 o’clock in the morning, there’s always the fact that the planet is threatening to terminally overheat. Yup

quikview  White Papers: The World’s Greatest Cure for Insomnia! Having trouble sleeping at night? Lots of people are these days, and for good reasons. The economy is in the dumps. Jobs are on the endangered species list. We’re steadily running out of oil. And terrorists are trying to kill us. Now, if all that isn’t enough to keep you awake at 4 o’clock in the morning, there’s always the fact that the planet is threatening to terminally overheat. Yup, life can cause insomnia , but I’ve found the cure. Read More

Five Must-have ERP Features for Medical Device Manufacturers


In the medical device manufacturing industry, errors can cost more than money—they can cost lives. In order to meet safety regulations, manufacturers are turning to enterprise resource planning (ERP) solutions. Discover the five features any medical device manufacturer should look for in an ERP system in order to meet compliance requirements, produce high-quality products, operate efficiently, and maximize profitability.

quikview  Must-have ERP Features for Medical Device Manufacturers Plex Online provides a turnkey manufacturing ERP software solution for medical device manufacturers with a specific focus on comprehensive CAPA functions, supplier quality management, traceability and more.Plex Online's integrated Quality Management System, Compliance Module, and Document Management System are especially useful in meeting the complex regulatory requirements of medical device manufacturing, including 21 CFR Part 11. Source: Plex Read More

These are the Times of CRM Vindication and Validation - Part 2


Part 1 of this blog series analyzed two white papers entitled “Customer Relationship Management: The Winning Strategy in a Challenging Economy” and “Maximizing CRM Effectiveness During Lean Times,” authored by Microsoft Dynamics CRM and Oracle CRM, respectively. My post made the case for forward-looking enterprises to leverage customer relationship management (CRM) solutions to

quikview  are the Times of CRM Vindication and Validation - Part 2 Part 1 of this blog series  analyzed two white papers entitled  “Customer Relationship Management: The Winning Strategy in a Challenging Economy”  and  “Maximizing CRM Effectiveness During Lean Times,”  authored by  Microsoft Dynamics CRM  and  Oracle CRM , respectively. My post made the case for forward-looking enterprises to leverage  customer relationship management (CRM)  solutions to help them both weather the ongoing Read More

TEC presents Its 2009 Manufacturing Execution Systems State of the Market Report


Technology Evaluation Centers Inc. (TEC), the leading resource for enterprise software selection, has released a new manufacturing execution systems (MES) state of the market report.

quikview  presents Its 2009 Manufacturing Execution Systems State of the Market Report TEC presents Its 2009 Manufacturing Execution Systems State of the Market Report   A buyer's guide for manufacturers looking for third-party expertise on MES solutions   Montreal , QC - Technology Evaluation Centers Inc. (TEC) , the leading resource for enterprise software selection, has released a new manufacturing execution systems (MES) state of the market report.   In a lean, demand-driven world, manufacturers are Read More

NIST Certification for AES Encryption


The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform.

quikview  Certification for AES Encryption The National Institute of Standards and Technology (NIST) defines the standard for AES encryption, and provides a rigorous testing process for software vendors. The certification process is carried out by independent testing labs who report the results to NIST for validation. The AES certification process tests every aspect of encryption and involves millions of encryption and decryption operations. Only the most dedicated security vendors are able to pass the tests Read More

Four Common ERP Implementation Mistakes


White papers offer no shortage of advice about what best practices can lead to enterprise resource planning (ERP) implementation success. But equally important is a thorough understanding of what practices are to be avoided during an implementation. This white paper reviews four “worst practices” that should be avoided at all costs—unless you want to go out of your way to cause your ERP implementation to fail.

quikview  Common ERP Implementation Mistakes With IFS Implementation, you gain the maximum value for each solution you install based on IFS Applications. With pre-packaged, best practice accelerators from your industry, your new solution is up and running – on-time and on-budget. Using IFS Navigator, you maintain transparent visibility and control over your project. Source: IFS Resources Related to Four Common ERP Implementation Mistakes : Enterprise Resource Planning (ERP) (Wikipedia) Implementation (Wikipe Read More

The Need for Vulnerability Management


New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards.

quikview  Need for Vulnerability Management The Need for Vulnerability Management If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Qualys® is headquartered in Redwood Shores, California, with offices in France, Germany, the U.K., Japan and Hong Kong, and has partners worldwide. Source : Qualys Resources Related to Vulnerability Management : Network Security (Wikipedia) The Need for Vulnerability Management Vulnerability Management is also Read More

RFID Workbench: Understanding the Basics


Radio frequency identification (RFID) helps actualize the perfect integration of logistical and commercial chains and its use is rising in the US and Europe among large companies; government departments; and industries. Setting up RFID requires a validation test on a defined perimeter that involves the processes that have the most direct impact on your activity to see how RFID will affect your environment.

quikview  Workbench: Understanding the Basics RFID Workbench: Understanding the Basics If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader . The emergence of radio frequency identification (RFID) technology as a force in the supply chain has created the need for middleware that can manage the flow of data between tag readers and enterprise applications in order to facilitate intelligent use of information generated by RFID tags. Source : Read More

Single Sign-on (SSO): Truths and Myths


Technology products always seem to come out strong, and then wither under intense scrutiny. This was the case with single sign-on (SSO). However, any product driven by strong need will reinvent itself to address the problems it contains. With SSO, a number of myths have now been exploded. Find out why it may be time for you to evaluate SSO for your company. Myth #1: You can’t get true SSO.

quikview  Sign-on (SSO): Truths and Myths Single Sign-on (SSO): Truths and Myths If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. OneSign® Single Sign-On provides a solution that is radically easy to implement - streamlining and tightening security without requiring any scripting, modifications to existing directories or applications, or inconvenient changes to end-user workflow. OneSign SSO enables convenient access to any and all enterpris Read More

Enterprise Information Management: Strategy, Best Practices, and Technologies on Your Path to Success


New data sources, unstructured data, and greater volumes of data than ever before are creating an information overload. Plus, customers’ demands for faster service stress front-office applications, while parallel demands from internal users place greater demands on back-office systems. Before you discover that your data quality has been rendered ineffective, consider adopting enterprise information management (EIM).

quikview  Information Management: Strategy, Best Practices, and Technologies on Your Path to Success Enterprise Information Management: Strategy, Best Practices, and Technologies on Your Path to Success If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. Founded in 1972, SAP has a rich history of innovation and growth as a true industry leader. SAP currently has sales and development locations in more than 50 countries worldwide and is Read More

ArticSoft


ArticSoft provides public key infrastructure (PKI)-enabled encryption and digital signature products. ArticSoft's products protect files, folders, e-mails, instant messages, Web pages, and content in any application. Users can generate x.509-compliant certificates/keys using the company's software or import them from any certificate authority. ArticSoft also provides a comprehensive security education center where users can read beginner guides and white papers on PKI, view online demos, or download free trials of the software. ArticSoft has over 30 years IT security experience. The company's chief executive officer (CEO), Steve Mathews, writes regular articles for Secure Computing magazine and is one of the authors of ISO/IEC 17799 (formerly BS7799).

quikview  ArticSoft provides public key infrastructure (PKI)-enabled encryption and digital signature products. ArticSoft's products protect files, folders, e-mails, instant messages, Web pages, and content in any application. Users can generate x.509-compliant certificates/keys using the company's software or import them from any certificate authority. ArticSoft also provides a comprehensive security education center where users can read beginner guides and white papers on PKI, view online demos, or downlo Read More

Bloor Research


Established in 1989, Bloor Research conducts analysis, information technology research, and consultancy. The company publishes white papers, reports, and product evaluations.

quikview  Research Established in 1989, Bloor Research conducts analysis, information technology research, and consultancy. The company publishes white papers, reports, and product evaluations. Read More