X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 text and code editing


Source Code Translation
Everyone who writes computer software eventually faces the requirement of converting a large code base from one programming language to another. But source

text and code editing  to a set of text files. Those files are imported into an empty WinA&D project to populate the data dictionary and automatically generate a set of graphic diagrams. This automated process can usually be done in minutes. Consider a translation project with Objective-C source code being converted to Java code using MacA&D and MacTranslator on a Mac OS X computer. The concepts, tools and approach are essentially the same for other languages or when using WinA&D and WinTranslator on Windows. For example,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

HCIMS - Document Management RFI/RFP Template

Scanning, Importing, Optical Character Recognition (OCR), Indexing and Storage, Retrieval, Editing, Viewing, Patient Records, Electronic Signature, Printing and Faxing, Workflow, Security, System Management, and Product Technology 

Evaluate Now

Documents related to » text and code editing

Mid-Market ERP Vendors Doing CRM & SCM In A DIY Fashion Part 1: Recent Announcements


While the ERP mid-market has seen more vibrant intra-market merger & acquisition activity during 2001, it appears that 2002 will, for some more tenacious Tier 2/Tier 3 vendors, be the year of delivering products under their own steam as to counteract the onslaught by Tier 1 vendors and mid-market juggernauts.

text and code editing   Read More

Mainstream Enterprise Vendors Begin to Grasp Content Management Part One: PCM System Attributes


Enterprises are becoming painfully aware of the need to clean up their structured data and unstructured content acts to capitalize on more important efforts like regulatory compliance, globalization, demand aggregation, and supply chain streamlining.

text and code editing   Read More

Missing PDF Fonts: Why It Happens and What You Can Do About It


Fonts are the essential elements of any portable document format (PDF) file, but are often taken for granted by most readers. But what if you are a developer and fonts are missing? What should you do? Why does this happen? In the first of a two-part white paper series, explore some of the core PDF concepts, font technologies, and get an introduction to the problem of missing fonts in PDF documents.

text and code editing   Read More

The Power of Knowledge -- Knowledge is Power (Part 2)


Part 1 of this blog series introduced the need for knowledge management (KM) software applications as part of a more comprehensive and strategic service management (SSM) suite. One such broad SSM suite has been offered by Servigistics. Servigistics’ Service Knowledge Management (SKM) solution, the newest module within Servigistics SSM, is designed to meet the requirements of the technical

text and code editing   Read More

The Intelligence of Social Media (Part 2)


In the first part of this blog, I mentioned that sentiment analysis measures the polarity of opinion—positive, negative, or neutral—regarding a subject, a product, a service, etc. Two main approaches can be used to perform sentiment analysis or text mining: a knowledge-based approach, which uses linguistic models to classify sentiments; and a learning-based approach, which uses

text and code editing   Read More

AGPL v3 Touches Web Services


The Free Software Foundation (FSF) issued a press release on its newly published Affero General Public License (AGPL) version 3. This license affects the modification and distribution of software oriented toward Web-based services. The popular adoption of Web-based applications as an alternate to in-house software implementations has meant that free and open source software developed for web

text and code editing   Read More

HR Executive's Guide to Web 2.0: Cracking the Code for Talent Management


Find out in the Aberdeen report HR Executive's Guide to Web 2.

text and code editing   Read More

Web Application Security: The Truth about White Box Testing versus Black Box Testing


Information security managers, quality assurance staff, and developers are faced with the enormous responsibility of keeping Web applications secure from the ever-growing menace of hackers and internal threats alike. So how can they protect sensitive data without exhausting internal resources, overspending the budget, or being forced to use costly manual penetration testing using external consulting firms?

text and code editing   Read More

How Modern Code Generation Works: An Insider’s Guide


To meet high user expectation for applications, your IT department must find ways to improve productivity and complete projects according to the latest standards—often with a reduced head count. In this environment, wasting time on code writing and other repetitive tasks is agonizing. But application generators can automate and manage your development processes. Learn about the functionality that can benefit your company.

text and code editing   Read More

Should You Modify an Application Product?


When it comes to modifications to an application product, there is the good, the bad, and the ugly. Enter the modification process cautiously, with your eyes open.

text and code editing   Read More

Electronic Product Code (EPC): A Key to RFID


The real benefits of radio frequency identification will be achieved, when the integration of the EPC data will be a substantial part for the control of supply chain business processes.

text and code editing   Read More

How to Block NDR Spam


Research shows that up to 90 percent of e-mail received by companies is spam. In the beginning, spam was mainly text-based, but over the past few years, spammers are increasingly using embedded images and attaching common file types, such as mp3s, to gain access to mailboxes. Learn more about the types of spam out there, focusing on NDR, or non-delivery report spam—and how you can block it.

text and code editing   Read More

S&C Electric Uses ProjectLocker to Manage Development Across a Diverse Environment with Ease


For many years, S&C Electric, a global provider of electric power system equipment, used internally built tracking and Subversion data to manage source code and documents and to track viruses. But as it grew, its needs became more complex, and more maintenance time was required. A managed source control solution now manages and protects S&C Electric’s intellectual property, and saves the company a lot in man-hours.

text and code editing   Read More

Up Close and Personal: Martin Schneider, Senior Director of Communications at SugarCRM


Recently, I had the pleasure of speaking with Martin Schneider, Senior Director of Communications at SugarCRM where he provided information about the company, Sugar 6 (latest version), and social customer relationship management (SCRM). In this first up close and personal blog post, Martin will discuss what made Sugar CRM the most successful open source CRM product and one of the best CRM products

text and code editing   Read More