X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 technologies secure


CA Technologies
CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations

technologies secure  Technologies CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Solutions from CA Technologies are the critical foundation for helping customers gain deep insight into and exceptional control over their complex, mixed IT

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » technologies secure

i2 Technologies Lives Life In The Fast Lane


i2 Technologies is the largest and fastest growing vendor of supply chain management software with $751 million in revenue over the last twelve months and a 105% average growth rate over the last five years. Fueled by a powerful sales and marketing machine and aggressive strategies for corporate development and acquisition, i2 will maintain its lead through the end of 2000 and beyond.

technologies secure  Exchange, MyAircraft (Honeywell, United Technologies Corp., BF Goodrich), and many others. Figure 2. Figure 3. To successfully invade the e-commerce software market, i2 needed to secure a beachhead. It found this in June when it acquired Aspect Development Corporation (see IBM is not Enough: i2 Snatches Aspect and SupplyBase ). In addition to legitimizing its claim in e-commerce, the acquisition helped revive i2's revenue picture, at least artificially (see Figure 4). With Aspect's revenues added in Read More

Mid-market Getting the Taste of Some Emerging Technologies


Fledgling smart enterprise suite, business activity monitoring, and business process management technologies hold significant potential for end user organizations as they can accelerate the velocity of the business and deal with the details of everyday needs. The challenge is to fine-tune the system to dynamically combine event and contextual data.

technologies secure  mere aspect of the technologies mentioned above. This brings us to the also nascent and related area of business activity monitoring (BAM), with a jury still out deliberating whether it is a software category per se or a mere concept that triggers alerts and exception reports on both events and non-events, within and outside the four-walls of the enterprise (for more details on BAM's provision of stock ticker view of key business operations, see Business Activity Monitoring - Watching The Store For You Read More

Secure Mobile ERP-Is It Possible?


Mobile devices are the workstation of the future—the new normal. Today’s organizations need to support mobile devices, whether this means adapting current enterprise solutions or evaluating new enterprise solutions. But this presents new security challenges. Read this article to discover how information technology (IT) departments can collaborate with end users to find a balance between control and access.

technologies secure  in the devices. Different technologies can be used to access data in the mobile world. From a security standpoint, a browser-based application may be most desirable. A browser-based interface is preferred because data is not stored on the mobile device. But browser-based apps lack the optimization for mobile devices that native apps provide, often because they are not designed for the small screen and tend to have a keyboard-centric approach. Native apps—those that reside on the phone or tablet Read More

Five HR Technologies You Should Know


Almost everything you know about human resources (HR) outsourcing is about to change. The future is about single-source integration, and there are key new technologies that herald this era: unified service for HR, time, payroll, and expense tracking; management dashboards; streamlined employee interfaces; synchronous data with a single database; and empowered reporting.

technologies secure  one. 5 Core HRO Technologies you need to know:   Unified Service for HR, Time, Payroll and Expense Tracking Management Dashboard Streamlined Employee Interface With a Single Login Synchronous Data With a Single Database Empowered Reporting With A Common Report Writer 1. Unified Service for  HR, Time, Payroll and Expense Tracking In the first generation of HR outsourcing, simply delivering self-service functions to deskbound employees was a victory. With that victory came the ongoing campaign to deliver Read More

Intelex Technologies


pdg group 1221

technologies secure  Technologies pdg group 1221 Read More

Case Study: FMC Technologies


FMC Technologies Inc. of Houston is a leader in oil and gas equipment service. By replacing its legacy system with a new customer relationship management (CRM) application, the company integrated and centralized its forecasting data, enabling managers to make better decisions about supply chain capacity. Learn how this upgrade improved forecasting, increased user adoption, and lowered the total cost of ownership (TCO).

technologies secure  Study: FMC Technologies FMC Technologies Inc. of Houston is a leader in oil and gas equipment service. By replacing its legacy system with a new customer relationship management (CRM) application, the company integrated and centralized its forecasting data, enabling managers to make better decisions about supply chain capacity. Learn how this upgrade improved forecasting, increased user adoption, and lowered the total cost of ownership (TCO). Read More

CenturyLink Technologies


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

technologies secure  Technologies Read More

SmartPoint Technologies Ltd


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

technologies secure  Technologies Ltd Read More

Intelex Technologies


Intelex has been developing, implementing and supporting software for Environmental, Health and Safety, and Quality management for over twenty years. Our worldwide client base of over 800 customers and 750,000 system users depend on our software to capture, track and report on essential corporate data. 

technologies secure  Technologies Intelex has been developing, implementing and supporting software for Environmental, Health and Safety, and Quality management for over twenty years. Our worldwide client base of over 800 customers and 750,000 system users depend on our software to capture, track and report on essential corporate data. Read More

RingCube Technologies, Inc


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

technologies secure  Technologies, Inc Read More

i2 Technologies: Is the Boom Over?


Seemingly unaffected by market downturns and Y2K, i2 Technologies regularly astounds the enterprise applications software industry with record-breaking financial results. In the wake of its most recent triumph, few would imagine that i2 shows signs of decline.

technologies secure  2000 Event Summary i2 Technologies recently announced financial results for its fourth quarter and year ended December 31, 1999. Once again, its 1999 revenues and earnings reached record levels. Total revenues for the full year 1999 grew to $571.1 million, a 55% increase over $369.2 in total revenues for 1998. Excluding charges of $6.6 million associated with acquisitions, net income for 1999 grew 134% to $30.1 million, compared to 1998 net income of $12.8 million, excluding charges of $7.6 million Read More

nFocus Technologies Inc.


nFocus Technologies Inc. offers customer specific solutions through our consulting services and by providing leading business applications from Microsoft Business Solutions and SYSPRO. As a leading partner recognized for providing outstanding implementations and expertise, we work with our clients as a partner, offering superior quality products, backed with unparalleled support and service.

technologies secure  Technologies Inc. nFocus Technologies Inc. offers customer specific solutions through our consulting services and by providing leading business applications from Microsoft Business Solutions and SYSPRO. As a leading partner recognized for providing outstanding implementations and expertise, we work with our clients as a partner, offering superior quality products, backed with unparalleled support and service. Read More

Engago Technologies


There are currently no details available for this vendor. However, we are working to update this vendor’s information in our database as soon as possible. Please check back again.

technologies secure  Technologies Read More

Mindshare Technologies


Mindshare Technologies began as a two-employee operation and has expanded to serve brands throughout North America, Latin America, Asia, and Europe. It collects surveys in over 125 countries and 28 languages and helps companies transform customer and employee feedback into actionable steps to improve business.

technologies secure  Technologies Mindshare Technologies began as a two-employee operation and has expanded to serve brands throughout North America, Latin America, Asia, and Europe. It collects surveys in over 125 countries and 28 languages and helps companies transform customer and employee feedback into actionable steps to improve business. Read More