X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 ability to expand and customize fields without accessing the source code


SaaS Buyer's Guide for Wholesale and Distribution
SaaS, despite its phenomenal popularity, is certainly not one-size-fits-all. You need to consider decision criteria such as fit, return on investment, and risk.

ability to expand and customize fields without accessing the source code  themselves of the technological ability to integrate dispersed order fulfillment operations, warehouse management, inventory control, and customer relationship management (CRM) functions. During volatile economic circumstances, however, organizations within the W&D industry are also seeking ways to lower their technological overhead. Recently, this shift has taken the form of moving away from traditional delivery methods (i.e., on-premise systems) toward software-as-a-service (SaaS) or on-demand

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Linux and Open Source IT Services (Excel Format) RFI/RFP Template

OS and Application Services, Support Services, Consulting, Implementatation, and Reselling, Migration and Version Maintenance Services, Customization Services, Development Services, Security Services, License Support and Applicability, Training and Community Participation, High-Level Market Characteristics 

Evaluate Now

Documents related to » ability to expand and customize fields without accessing the source code

Collaboration: The New Standard in the Supply Chain


Collaboration is becoming more and more critical to managing the supply chain process. Collaboration can take many forms in the supply chain, such as visibility, data sharing, collaborative forecasting, outsourcing, sharing resources, or joint processes. Context is needed to understand what is meant by collaboration". In this report, TEC Research Analyst Bob Eastman looks at collaboration and how it relates to demand planning and forecasting, sales and operations planning, vendor-managed inventory, and logistics, and gives important milestones marking the development of the use of collaboration in the supply chain over the last 50 years.

ability to expand and customize fields without accessing the source code   Read More

Seeing the Future in Discrete Manufacturing: Paving the Way for Success


The evolution of global discrete manufacturing is ongoing. How executives at manufacturing companies answer questions and anticipate what will be the right answer six months, a year, or two years from now will determine the success of their company. Infor examines current industry trends and identifies what it believes to be the seven trends producing the greatest stress and change in discrete manufacturing today.

ability to expand and customize fields without accessing the source code   Read More

Ask the Experts: What’s the Difference between ASP and SaaS?


This interesting question recently arrived in our Ask the Experts inbox, so I thought I’d write a brief post clarifying the difference between ASP and SaaS models.TEC’s Take on ASP and SaaS Perhaps not surprisingly, Wikipedia’s definitions for these two terms contribute to the confusion: An application service provider (ASP) is a business that provides computer-based services to

ability to expand and customize fields without accessing the source code   Read More

i2 Technologies at the Front of the Supply Chain


i2 Technologies is the largest and fastest growing vendor of supply chain management software with $456 million in revenue over the last twelve months and a 48% average growth rate over the last five years. Fueled by a powerful sales and marketing machine and corporate development strategy, i2 will maintain its lead through Y2K and beyond.

ability to expand and customize fields without accessing the source code   Read More

The Right Data at the Right Time


Among top-performing companies, nearly half deliver key information to business users when they need it in the moment. Get the details in this infographic from a report titled “Making the Real-Time Enterprise a Reality” provided by Harvard Business Review Analytic Services.

ability to expand and customize fields without accessing the source code   Read More

The Undocumented Layers of the OSI Model and Their Impact on Security


The biggest threat to data security doesn’t come from hackers, misconfigured firewalls, missing patches, or negligent employees. Nor is it in the application layer of the Open Systems Interconnection (OSI) Basic Model. Instead, there are three undocumented layers of the OSI Model that exert a huge influence on security decisions and the integrity of security programs. Learn about those layers and how to manage the threat.

ability to expand and customize fields without accessing the source code   Read More

Drink-IT, the Ideal Solution for the Efficient Reorganization of the Norwegian Mack Brewery




ability to expand and customize fields without accessing the source code   Read More

The Skillsoft Impact Analysis: The Fast Track to Gaining Powerful Insights into the Strengths and Opportunities of Your Elearning Investment


In this age of big data, decision makers on all levels are clamoring for business-driven data regarding the effectiveness of human capital investments. Hard quantifiable evidence, like business impact or ROI, can be complex and seem out of reach in the face of rapid change and constrained L&D resources. This paper introduces a simplified process and toolkit, and shares some of the key findings uncovered since its inception.

ability to expand and customize fields without accessing the source code   Read More

The Ghost in the Machine: Where Has Process Automation Left the Consumer?


Business process automation is all very well and good. After all, nothing succeeds like success, especially automated success. But what is the effect of automation on the consumer, that most unpredictable of systems?

ability to expand and customize fields without accessing the source code   Read More

The Teradata Database and the Intelligent Expansion of the Data Warehouse


In 2002 Teradata launched the Teradata Active Enterprise Data Warehouse, becoming a key player in the data warehouse and business intelligence scene, a role that Teradata has maintained until now. Teradata mixes rigorous business and technical discipline with well-thought-out innovation in order to enable organizations to expand their analytical platforms and evolve their data initiatives. In this report TEC Senior BI analyst Jorge Garcia looks at the Teradata Data Warehouse in detail, including functionality, distinguishing characteristics, and Teradata's role in the competitive data warehouse space.

ability to expand and customize fields without accessing the source code   Read More