Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Top WCM Software Comparisons
Find the best WCM software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needs—quickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Web 2.0: “Code Free” Siebel Web Service Integration
: Web 2.0: “Code Free” Siebel Web Service Integration Web 2.0: “Code Free” Siebel Web Service Integration Source: Green Beacon Solutions Document Type: White Paper Description: One of the most challenging areas in any Siebel implementation has traditionally been setting up and maintaining interfaces between Siebel and other back-end systems. However, it is now possible to create a real-time web service interface to other applications from Siebel 7.8 or 8.0, without writing a single line of code. Web
3/22/2007 1:46:00 PM
“Whistler” Beta on the Web?
Source code for a future Microsoft OS, code-named “Whistler”, mysteriously appeared on the Internet in mid-March. How did it get there? Does it matter? And why does Microsoft management keep making statements that are later retracted?
: “Whistler” Beta on the Web? “Whistler” Beta on the Web? R. Krause - April 14, 2000 Read Comments Event Summary [3/23/00] For the second time in approximately a month, a senior Microsoft executive has publicly reversed himself, or been reversed by HQ, before the ink was dry . In February, it was Chief Software Architect Bill Gates. (Refer to TEC News Analysis Microsoft says: Pay No Attention to the Man Behind the Glasses for the earlier instance.) This time, it was Jim Allchin, the vice
The Cobalt Group Drives a New Web Deal
The Cobalt Group and National Automobile Dealers Association form a partnership to help dealers build online capabilities and expand consumer choice.
: Group Drives a New Web Deal The Cobalt Group Drives a New Web Deal A. Turner - January 20, 2000 Read Comments Event Summary On Monday, January 10th, the National Automobile Dealers Association (NADA) and The Cobalt Group, Inc. (Nasdaq:CBLT), announced plans for the development of an automotive portal and packages to help automobile dealers create websites. Cobalt, a provider of Internet solutions for the automotive industry will offer NADA dealers two different NADA-endorsed web packages for use in
AGPL v3 Touches Web Services » The TEC Blog
AGPL v3 Touches Web Services » The TEC Blog TEC Blog TEC Home About TEC Contact Us About the Bloggers Follow TEC on Twitter RSS Discussing Enterprise Software and Selection --> Fast, Accurate Software Evaluations TEC helps enterprises evaluate and select software solutions that meet their exacting needs by empowering purchasers with the tools, research, and expertise to make an ideal decision. Your software selection starts here. Learn more about TEC s software
: AGPL, innovation, soa, web 2.0, web based service, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Collecting Meaningful Data from the Web: Once an Impossibility, Now a Reality
The traditional way of extracting data from disparate data sources has been transformed by the emergence of new tools and applications, as well as the appearance of new and massive sources of information like the Web. Learn about tools you can use to turn Web data into an important asset for your organization.
: the recent explosion of Web content , along with the rapid evolution of software systems, other types of data extraction have become necessary. Organizations now require alternative ways to collect information coming from vast amounts of external Web pages, for such purposes as monitoring customer sentiment, measuring marketing results, and collecting Web content for research purposes. But for this type of data extraction, companies may not have an API available, either because an API for this does not ex
12/2/2010 8:27:00 AM
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk assessments that mitigate risk by applying security risk management policies designed to protect a company’s data.
: Assessment and Management in Web Application Security Security Risk Assessment and Management in Web Application Security Caleb Sima - June 6, 2008 Read Comments Originally published January 27, 2006 Security risk assessment and security risk management have become vital tasks for security officers and IT managers. Corporations face increased levels of risk almost daily from software vulnerabilities hidden in their business-technology systems to hackers and cyber crooks trying to steal proprietary
Understanding SOA, Web Services, BPM, BPEL, and MorePart One: SOA, Web Services, and BPM
In the larger schema of things, SOA would espouse general, more abstract concepts of software reusability and encapsulation within certain boundaries (as to then provide access to that software via defined interfaces), Web services would then make these SOA concepts vendor-independent due to their use of generally accepted standards, while BPM and BPEL would be some of the engines making the whole system work.
: Understanding SOA, Web Services, BPM, BPEL, and More Part One: SOA, Web Services, and BPM Understanding SOA, Web Services, BPM, BPEL, and More Part One: SOA, Web Services, and BPM P.J. Jakovljevic - December 22, 2004 Read Comments Introduction The battle for the dominance in Service Oriented Architecture (SOA) and Web services has so far largely been a war of words without the clear winner yet (and not any time soon), as many underlying Internet-based standards have emerged only recently. Still, the
Web Security: Bullet-Proofing Your Site with SSL
In this security guide from Symantec you'll discover that the best solution can also be the most cost-effective.
: Web Security: Bullet-Proofing Your Site with SSL Web Security: Bullet-Proofing Your Site with SSL Unsecured networks, especially wi-fi, pose serious security risks, particularly with the advent of Firesheep-style sidejacking attacks. End-to end HTTPS encryption is one surefire solution—but what about the cost? So, what is the best approach you can take to ensure optimal protection? In this security guide from Symantec you ll discover that the best solution can also be the most cost-effective. Get all
2/3/2012 1:59:00 PM
The Cost of Employee Web Misuse
In the white paper employee web use and misuse learn how to protect yourself from the wide range of problems your company can run into.
: The Cost of Employee Web Misuse The Cost of Employee Web Misuse E-mails, shopping, social networks—it s easy to get distracted with all that the Web has to offer, even when you re at work. But how much is too much when it comes to personal Web surfing on the job? Where should employers draw the line? Web misuse can have serious implications for your business, including reduced employee productivity; security problems; legal risks; wasted bandwidth; unlicensed software; and reputation risk. In the white
Teloquent To e.t.: Now You Can Call Or Use The Web
Teloquent introduced a new release of its software to integrate phone and web-based customer service.
: Call Or Use The Web Teloquent To e.t.: Now You Can Call Or Use The Web D. Geller - April 21, 2000 Read Comments D. Geller - April 21st, 2000 Event Summary Teloquent Communications Corporation has its roots in telephony, as an enabler of call centers. Their Web ContactServer 2.1 integrates traditional telephone routing with Web-based customer service tools to provide a consistent experience for both customers and agents. Customers browsing a website are given multiple options for seeking assistance,
Maintenance Software--Plan Ahead to Maximize CMMS Vendor Web Site Visits
For those looking for a computer maintenance management system (CMMS) vendor, the Web is often the first place to start. There are a number of web site features one should examine in order to maximize web site visits. Reprinted with permission from Plant Engineering and Maintenance magazine.
: to Maximize CMMS Vendor Web Site Visits Maintenance Software--Plan Ahead to Maximize CMMS Vendor Web Site Visits David Berger - February 21, 2004 Read Comments Maintenance Software—Plan Ahead to Maximize CMMS Vendor Web Site Visits Featured Author - David Berger - February 21, 2004 Introduction For those looking for a computer maintenance management system (CMMS) vendor, the Web is often the first place to start. There are a number of web site features one should examine in order to maximize web site
White Paper Newsletters