Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Top WCM Software Comparisons
Find the best WCM software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
“Skunkworks” for Search Engine Marketing and Optimization
: “Skunkworks” for Search Engine Marketing and Optimization “Skunkworks” for Search Engine Marketing and Optimization Source: bwired Document Type: White Paper Description: Search engine marketing (SEM)? We’re talking about tactics for Web site promotion—increasing both a site’s visibility to Google (and other search engines) and the site’s prominence in search engine results. We’re talking about pulling visitors through search engine optimization (SEO) and improved organic listing and
8/10/2009 2:31:00 AM
Secure Your Search Engine
Webservers running the search engines are vulnerable to a serious security compromises. Without careful implementation, user passwords and logins can be stolen, and the entire server could be brought to its knees by hackers.
: Secure Your Search Engine Secure Your Search Engine L. Taylor - October 26, 1999 Read Comments Event Summary A serious root level compromise on Zeus Technologies high-performance web-server was reported on the well-known Bugtraq security mailing list earlier today. In its insecure state, the Zeus search engine, which is transportable to virtual websites, can be used to request any file on the webserver, including the password file which contains the root password. Once you are logged into a UNIX server
Trends in LMS
Companies and educational institutions use learning management systems (LMSs) to provide training and e-learning. With over 250 LMSs currently on the market, smaller and medium-sized enterprises are now adopting this software and using it to boost performance. Find out why.
: be put into a searchable database. It is seen as a way of facilitating informal learning or, in some cases, giving it structure or controlling it. Informal learning is unstructured and often occurs between individuals in conversations. It has been estimated that the great majority (upwards of 70 percent) of learning in the workplace is informal (see Participation in Adult Education and Lifelong Learning: 2000-01 ). Mzinga bases its whole offering on social networking while Saba offers Saba Social ; and
Intel Server Trends
The Intel-based server market is one of the most hotly contested segments in the industry. What are the key trends in this market, and what will they mean to users, vendors, and the products themselves?
: Intel Server Trends Intel Server Trends R. Krause - May 9, 2000 Read Comments R. Krause - May 9, 2000 Introduction: The product space being examined is Intel-based servers (still known as PC servers in some areas). In this note, we will examine how five key trends affect users, vendors, and the product(s). In the Intel-based server market, there are five trends of note: Market consolidation Consolidation of servers within a company Focused functionality, e.g., server appliances Movement toward
Top 7 Trends Transforming the High Tech Industry
The last three decades have seen a profound shift in how and where tech manufacturing and services are done. There is no doubt that globalization fuels a remarkable explosion in growth opportunities, but there remains considerable risk to manufacturers that follow the outsourcing model. But it is up to the high tech industry to adapt to address the new challenges and new opportunities that have sprung from globalization. This report provides a broad overview of the trends transforming the high tech industry today, and the technologies in play that can help overcome new obstacles and capture new opportunities.
: Top 7 Trends Transforming the High Tech Industry Top 7 Trends Transforming the High Tech Industry Source: SAP Document Type: White Paper Description: The last three decades have seen a profound shift in how and where tech manufacturing and services are done. There is no doubt that globalization fuels a remarkable explosion in growth opportunities, but there remains considerable risk to manufacturers that follow the outsourcing model. But it is up to the high tech industry to adapt to address the new
6/5/2013 12:09:00 PM
IT Infrastructure Trends in Banking
In the current regulatory environment, banks are facing two levels of challenges. While they are under pressure to expand beyond home territories, they also face stifling regulatory constraints. These restrictions are forcing banks to maximize on every capital expenditure they make. Such financial and regulatory reforms, in the face of the economic slowdown, have positive effects on quality assurance, governance and data management. But it also forces banks to hold capital that they would otherwise invest. This environment has made it vital for banks to sharpen their analytical and forecasting capabilities. Find out how the burden of regulation, expansion, cost optimization, and business transformation can be shared by an expert partner to foster an environment for growth.
: Model Business Analytics: Nucleus Research Note—How Analytics Makes Midsize Companies More Profitable Acronym-Related White Papers: Business Intelligence (BI) | Customer Relationship Management (CRM) | Enterprise Resource Planning (ERP) | Human Capital Management (HCM) | Information Technology (IT) | Key Performance Indicators (KPIs) | Return on Investment (ROI) | Software as a Service (SaaS) | Total Cost of Ownership (TCO)
11/14/2011 6:15:00 AM
2011 Trends Report: Business Intelligence (BI)
The current economic environment is marked by more frequent changes than in the past. It’s no wonder that more businesses are looking to business intelligence (BI) software to identify and analyze business data to speed responses to these changes. So, what changes are ahead for BI? In this guide, experts Bill Cabiro, David Crandall, Wayne Kernochan, Kirsty Lee, Clarice Lin and Shawn Rogers share their predictions for BI.
: Intelligence (BI) Source: Focus Research Document Type: White Paper Description: The current economic environment is marked by more frequent changes than in the past. It’s no wonder that more businesses are looking to business intelligence (BI) software to identify and analyze business data to speed responses to these changes. So, what changes are ahead for BI? In this guide, experts Bill Cabiro, David Crandall, Wayne Kernochan, Kirsty Lee, Clarice Lin and Shawn Rogers share their predictions for BI.
7/29/2011 3:14:00 PM
Current Trends in Messaging
As electronic communication has grown, geographic boundaries have shrunk, enabling an onslaught of mobile executives.
: as a RIM pager (Research In Motion), which allows a user constant access to e-mail. Another option may be to roll out Wireless Access Phones (WAP) to a smaller target test group and verify that your organization benefits from the enhanced remote communication capabilities. Trend 2: The Wireless Big Bang Walking hand in hand with Unified Messaging is the extension of the Universal Inbox to wireless access phones (WAP) and Personal Digital Assistants (PDA). The Wireless Messaging market is expected to consi
Two Stalwart Vendors Discuss Market Trends
In this unique question and answer series, vendors were given the opportunity to put forth their views on market trends, platform approaches, and mid-market issues. The questions posed to willing participants of this opinion poll are elaborated on here.
: Two Stalwart Vendors Discuss Market Trends Two Stalwart Vendors Discuss Market Trends P.J. Jakovljevic - June 29, 2007 Read Comments Over the last several months, we have attended numerous vendor events and user conferences, and have witnessed an avalanche of press releases and announcements about these vendors respective strategies, their products long- and mid-term road maps, immediate enhancements, and so on. While it is only natural that every vendor will claim its strategy, moves, or product
Deploying and Supporting Enterprise Search
There are more than 120,000 employees, contractors, and vendors at Microsoft®, and they create an incredible amount of digital information. Files and data are stored on a variety of internal content sources, and new types of content are added daily. Learn how Microsoft® IT has helped users locate relevant information faster by deploying the enterprise search feature of Microsoft® Office SharePoint® Server 2007.
: Deploying and Supporting Enterprise Search Deploying and Supporting Enterprise Search Source: Microsoft Document Type: White Paper Description: There are more than 120,000 employees, contractors, and vendors at Microsoft®, and they create an incredible amount of digital information. Files and data are stored on a variety of internal content sources, and new types of content are added daily. Learn how Microsoft® IT has helped users locate relevant information faster by deploying the enterprise search
9/24/2008 11:30:00 AM
Best Practices for Secure Desktop-based Information Search in the Enterprise
Knowledge workers by the millions are leveraging desktop search (DTS) tools. However, with change comes risk, and failing to proactively establish policies and lock down a centrally managed DTS solution can result in significant civil and criminal liabilities. But by following a few basic principles, companies can realize the full benefits of this new technology, while enhancing their information security.
: for Secure Desktop-based Information Search in the Enterprise Best Practices for Secure Desktop-based Information Search in the Enterprise Source: X1 Technologies, Inc. Document Type: White Paper Description: Knowledge workers by the millions are leveraging desktop search (DTS) tools. However, with change comes risk, and failing to proactively establish policies and lock down a centrally managed DTS solution can result in significant civil and criminal liabilities. But by following a few basic
12/15/2006 9:14:00 AM
White Paper Newsletters