X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 application


Application Lifecycle Maintenance
Lionbridge offers scalable application development and maintenance solutions that include custom software development, code enhancements, and legacy systems

application  Maintenance Lionbridge offers scalable application development and maintenance solutions that include custom software development, code enhancements, and legacy systems maintenance. Through multiple, low-cost development center options in India, Ireland, and China, Lionbridge uses a five-stage process to move critical IT activities offshore. In India, its mature, yet flexibel process frameworks have achieved a Software Capability Maturity Model level® 5 rating.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Outsourcing, Applications Software

This RFP is focused on the selection of companies who provide outsource services in the areas of application software. The typical types of activities that these outsource providers perform include software development; software maintenance; software reengineering/rearchitecting; porting software to a new platform; defect correction and bug fixing; and software testing; etc. Application areas could include core applications, enterprise applications, web applications, integration between applications, mainframe applications, desktop applications, wireless applications, software packages, and games. 

Evaluate Now

Documents related to » application

Build Web 2.0 Applications without Hand-coding: Use Application Generation to Expedite Web Application Development


Web 2.0 applications, perceived by many software users as better looking and easier to use than traditional apps, can provide many benefits to your company. However, building Web 2.0 apps adds development burdens of security, transaction management, and a variety of user interface features. To conquer these issues, you might consider an application generator to eliminate hand-coding infrastructure programming. Learn more.

application  Applications without Hand-coding: Use Application Generation to Expedite Web Application Development Web 2.0 applications, perceived by many software users as better looking and easier to use than traditional apps, can provide many benefits to your company. However, building Web 2.0 apps adds development burdens of security, transaction management, and a variety of user interface features. To conquer these issues, you might consider an application generator to eliminate hand-coding infrastructure Read More

Business Value of Network and Application Visibility


Find out in Achieving Business Value with Network and Application Visibility.

application  Value of Network and Application Visibility Business Value of Network and Application Visibility Networks have become central to a company's ability to create new products and services, enter new markets, and develop new partnerships. But what are the business drivers and challenges facing network administrators? And how are companies leveraging their networks for competitive advantage? Find out in Achieving Business Value with Network and Application Visibility . In this IDC report based on a survey of Read More

What's Wrong With Application Software? Business Processes Cross Application Boundaries


The reality of today’s application environment is that no single application meets all of the needs of a business, or frequently even the needs of a single business process, so multiple applications must work together to support business processes.

application  s Wrong With Application Software? Business Processes Cross Application Boundaries Introduction Application boundaries are artificial walls created by the software industry, not businesses. Business processes and the people that execute them shouldn't have to care about application boundaries. It shouldn't matter to them that taking an order from their customer starts in the CRM system, accesses the custom pricing algorithms in the legacy COBOL application and then finalizes the order in ERP. The Read More

Application Security, Inc.


Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step process allows organizations to proactively manage risk by baselining what elements they have and identifying what vulnerabilities are present on them; prioritizing security measures based on value and risk; intelligently applying protection based on this prioritization; and then applying ongoing monitoring to flag any issues. AppSecInc products are the industry's most complete line of security solutions for the application tier that apply to applications the same vulnerability management methodology organizations use to secure their networks and general-purpose operating systems. By securing data at its source, we enable organizations to more confidently extend their business with customers, partners and suppliers while meeting regulatory compliance requirements. Our security experts, combined with our strong support team, deliver up-to-date application safeguards that minimize risk and eliminate its impact on business. Please contact us at 1-866-927-7732 to learn more, or visit us on the web at www.appsecinc.com

application  Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step Read More

The 2008 Handbook of Application Delivery: A Guide to Decision Making


IT organizations can no longer manage networks in isolation from the applications they support, requiring a shift from focusing on devices to a focus on performance. But a number of factors complicate the task of ensuring acceptable application performance, including the lack of visibility into application performance. Learn tips to plan, optimize, manage, and control your application performance and improve delivery.

application  2008 Handbook of Application Delivery: A Guide to Decision Making The 2008 Handbook of Application Delivery: A Guide to Decision Making If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader.   When NetQoS was founded in 1999, traffic over the WAN was increasing in volume and complexity, leading to growing application performance issues. However, most approaches to network management still focused on device availability and fault management, Read More

The Application Server War Escalates


At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the application server market has become, they argued over whose product was better, faster, cheaper. The keynote was so rife with charges and countercharges that they had to hold an after-keynote press conference to explain themselves.

application  Application Server War Escalates The Application Server War Escalates M. Reed - June 25, 2001 Event Summary At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the application server market has become, they argued over whose product was better, faster, cheaper. The keynote was so rife with charges and countercharges that they had to hold an after-keynote press conference to explain themselves. BEA is Read More

IBM Nabs Another Application Vendor


Vignette is IBM's latest partner. This global strategic alliance promises to boost revenue for both parties. The verdict is still out on the impact to future software development.

application  Nabs Another Application Vendor IBM Nabs Another Application Vendor L. Talarico - August 31, 2000 Event Summary International Business Machines Corporation. (NYSE: IBM) recently entered into a global strategic alliance with Vignette (NASDAQ: VIGN), a developer of e-businesses applications including CRM software. Under the agreement Vignette will closely integrate the V/5 E-business Applications suite with IBM's WebSphere Commerce Suite and Application Server. As part of the agreement Vignette promises Read More

Yekta Pajouhan Application Software Development


Yekta Pajouhan Software Development Company was established in 1999 by a group involved in various industrial and commercial software design and development projects in Iran. Initially the company designed and developed custom software for medium to large industrial organizations. From this, Yekta Pajouhan began developing an integrated software solution and the YEKTA ERP project was born. Development began in 2001, and after three years, in 2004, the product was introduced to the market. Since then, YEKTA ERP software has been implemented in a number of automotive and manufacturing industries in Iran. In addition to designing and developing software, Yekta Pajouhan provides services in training, process analysis, re-engineering, and other consultation fields.

application  Pajouhan Application Software Development Yekta Pajouhan Software Development Company was established in 1999 by a group involved in various industrial and commercial software design and development projects in Iran. Initially the company designed and developed custom software for medium to large industrial organizations. From this, Yekta Pajouhan began developing an integrated software solution and the YEKTA ERP project was born. Development began in 2001, and after three years, in 2004, the product Read More

Enterprise Application Integration - the Latest Trend in Getting Value from Data


Enterprise Application Integration (EAI) is one of the hot-button issues in IT for the Year 2000. Information Week Research's survey of 300 technology managers showed nearly 75% of respondents said EAI is a planned project for their IT departments in the coming year. According to a survey conducted by Bank Boston, the market for EAI is expected to be $50 Billion USD by 2001. However, successful EAI requires a careful combination of a middleware framework, distributed object technologies, and custom consulting.

application  Application Integration - the Latest Trend in Getting Value from Data Summary Enterprise Application Integration (EAI) is one of the hot-button issues in Information Technology in 2000. Information Week 's research survey of 300 technology managers showed nearly 75% of respondents said EAI is a planned project for their IT departments in the coming year. According to a study by Bank Boston, the market for EAI is expected to be $50 Billion USD by 2001. Successful EAI requires a careful Read More

Is Your Enterprise Application on a Road to Nowhere?


Consolidation is a well-documented trend and is to be expected in the market for enterprise applications. This article outlines the evolution of the enterprise software market. Specifically, it focuses on the revolutionary technology known as service-oriented architecture (SOA).

application  Your Enterprise Application on a Road to Nowhere? Originally published - December 22, 2006 Your business changes continuously. You add and drop service or product lines. Your customers demand new and challenging levels of flexibility or integration with their operations. New laws and regulations require that you track more and more data on your operations in highly specific formats. And there is the relentless demand to increase operational efficiency and product quality year after year while reducing Read More

IC-TAG Solutions Introduces RFID JumpStart Kit


IC-Tag Solutions has introduced an radio frequency identification (RFID) Jumpstart Kit called the “IC-DEMO.” IC-DEMO is a complete RFID demo system that allows users to determine how RFID will work in their environment. The kit allows users to become familiar with RFID and test or develop applications. The IC-DEMO Jumpstart Kit comes with a collection of tags that span a variety of types, forms

application  and test or develop applications. The IC-DEMO Jumpstart Kit comes with a collection of tags that span a variety of types, forms, and vendors (Avery Dennison, Smartrac, and Alien Technology) which includes on-metal and low-cost tags. All that’s needed to configure and test the solution is IC-DEMO and a laptop. Tag selection is a critical part of any RFID application. The kit allows engineers to set up a working demo and test the impacts of temperature, power, and an assortment of environmental factors Read More

Microsoft Expertise Developing Mobile Application


By integrating data from disparate systems and delivering data in a management dashboard on a personal digital assistant (PDA) or cell phone, Persistent enabled service engineers to collect and update data related to tire usage. This solution seamlessly integrated approximately 1,000 dealers in more than 15 European countries to central data servers and a CRM solution. The result? Improved customer end acquisition and satisfaction.

application  Expertise Developing Mobile Application By integrating data from disparate systems and delivering data in a management dashboard on a personal digital assistant (PDA) or cell phone, Persistent enabled service engineers to collect and update data related to tire usage. This solution seamlessly integrated approximately 1,000 dealers in more than 15 European countries to central data servers and a CRM solution. The result? Improved customer end acquisition and satisfaction. Read More

RFID Case Study: Gillette and Provia Part Two: Challenges and Lessons Learned


Compliance with the market RFID mandate has unfortunately preceded the achievements of applied physics and computer science. One of the main obstacles is the lack of integration, since there is a dearth of software tools from enterprise application integration vendors to get data from RFID tags and readers into existing business systems, meaning that companies are often forced to do expensive custom integration work.

application  software tools from enterprise application integration vendors to get data from RFID tags and readers into existing business systems, meaning that companies are often forced to do expensive custom integration work. Together with the vendors, they will have to devise ways to filter out false or redundant reads and pass on only useful information to enterprise applications. Managers will have to devise policies on how much data to collect from RFID systems, which signals to record, which to ignore, and Read More

Keys to Accelerating Web Application Delivery


Slowdowns, scalability issues, and security gaps hit Web applications where it hurts. Data center consolidations put distance between application servers and users—producing long round-trips and slow response times. Luckily, there is a solution. Deploying a wire-speed application system—in a unified single-platform design—boosts response times, improves infrastructure scalability, and safeguards against security threats.

application  to Accelerating Web Application Delivery Slowdowns, scalability issues, and security gaps hit Web applications where it hurts. Data center consolidations put distance between application servers and users—producing long round-trips and slow response times. Luckily, there is a solution. Deploying a wire-speed application system—in a unified single-platform design—boosts response times, improves infrastructure scalability, and safeguards against security threats. Read More