Home
 > search for

Featured Documents related to »  application


Application Lifecycle Maintenance
Lionbridge offers scalable application development and maintenance solutions that include custom software development, code enhancements, and legacy systems

application  Maintenance Lionbridge offers scalable application development and maintenance solutions that include custom software development, code enhancements, and legacy systems maintenance. Through multiple, low-cost development center options in India, Ireland, and China, Lionbridge uses a five-stage process to move critical IT activities offshore. In India, its mature, yet flexibel process frameworks have achieved a Software Capability Maturity Model level® 5 rating. Read More

Outsourcing, Applications Software
This RFP is focused on the selection of companies who provide outsource services in the areas of application software. The typical types of activities that these outsource providers perform include...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » application


Build Web 2.0 Applications without Hand-coding: Use Application Generation to Expedite Web Application Development
Web 2.0 applications, perceived by many software users as better looking and easier to use than traditional apps, can provide many benefits to your company

application  Applications without Hand-coding: Use Application Generation to Expedite Web Application Development Web 2.0 applications, perceived by many software users as better looking and easier to use than traditional apps, can provide many benefits to your company. However, building Web 2.0 apps adds development burdens of security, transaction management, and a variety of user interface features. To conquer these issues, you might consider an application generator to eliminate hand-coding infrastructure Read More
Business Value of Network and Application Visibility
Find out in Achieving Business Value with Network and Application Visibility.

application  Value of Network and Application Visibility Business Value of Network and Application Visibility Networks have become central to a company's ability to create new products and services, enter new markets, and develop new partnerships. But what are the business drivers and challenges facing network administrators? And how are companies leveraging their networks for competitive advantage? Find out in Achieving Business Value with Network and Application Visibility . In this IDC report based on a survey of Read More
What's Wrong With Application Software? Business Processes Cross Application Boundaries
The reality of today’s application environment is that no single application meets all of the needs of a business, or frequently even the needs of a single

application  s Wrong With Application Software? Business Processes Cross Application Boundaries Introduction Application boundaries are artificial walls created by the software industry, not businesses. Business processes and the people that execute them shouldn't have to care about application boundaries. It shouldn't matter to them that taking an order from their customer starts in the CRM system, accesses the custom pricing algorithms in the legacy COBOL application and then finalizes the order in ERP. The Read More
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's

application  Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step Read More
The 2008 Handbook of Application Delivery: A Guide to Decision Making
IT organizations can no longer manage networks in isolation from the applications they support, requiring a shift from focusing on devices to a focus on

application  2008 Handbook of Application Delivery: A Guide to Decision Making The 2008 Handbook of Application Delivery: A Guide to Decision Making If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader.   When NetQoS was founded in 1999, traffic over the WAN was increasing in volume and complexity, leading to growing application performance issues. However, most approaches to network management still focused on device availability and fault management, Read More
The Application Server War Escalates
At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the

application  Application Server War Escalates The Application Server War Escalates M. Reed - June 25, 2001 Event Summary At JavaOne in San Francisco, a battle ensued between BEA Systems CEO Bill Coleman, and Oracle CEO Larry Ellison. In a truly ugly display of how contentious the application server market has become, they argued over whose product was better, faster, cheaper. The keynote was so rife with charges and countercharges that they had to hold an after-keynote press conference to explain themselves. BEA is Read More
IBM Nabs Another Application Vendor
Vignette is IBM's latest partner. This global strategic alliance promises to boost revenue for both parties. The verdict is still out on the impact to future

application  Nabs Another Application Vendor IBM Nabs Another Application Vendor L. Talarico - August 31, 2000 Event Summary International Business Machines Corporation. (NYSE: IBM) recently entered into a global strategic alliance with Vignette (NASDAQ: VIGN), a developer of e-businesses applications including CRM software. Under the agreement Vignette will closely integrate the V/5 E-business Applications suite with IBM's WebSphere Commerce Suite and Application Server. As part of the agreement Vignette promises Read More
Yekta Pajouhan Application Software Development
Yekta Pajouhan Software Development Company was established in 1999 by a group involved in various industrial and commercial software design and development

application  Pajouhan Application Software Development Yekta Pajouhan Software Development Company was established in 1999 by a group involved in various industrial and commercial software design and development projects in Iran. Initially the company designed and developed custom software for medium to large industrial organizations. From this, Yekta Pajouhan began developing an integrated software solution and the YEKTA ERP project was born. Development began in 2001, and after three years, in 2004, the product Read More
Enterprise Application Integration - the Latest Trend in Getting Value from Data
Enterprise Application Integration (EAI) is one of the hot-button issues in IT for the Year 2000. Information Week Research's survey of 300 technology managers

application  Application Integration - the Latest Trend in Getting Value from Data Summary Enterprise Application Integration (EAI) is one of the hot-button issues in Information Technology in 2000. Information Week 's research survey of 300 technology managers showed nearly 75% of respondents said EAI is a planned project for their IT departments in the coming year. According to a study by Bank Boston, the market for EAI is expected to be $50 Billion USD by 2001. Successful EAI requires a careful Read More
Is Your Enterprise Application on a Road to Nowhere?
Consolidation is a well-documented trend and is to be expected in the market for enterprise applications. This article outlines the evolution of the enterprise

application  Your Enterprise Application on a Road to Nowhere? Originally published - December 22, 2006 Your business changes continuously. You add and drop service or product lines. Your customers demand new and challenging levels of flexibility or integration with their operations. New laws and regulations require that you track more and more data on your operations in highly specific formats. And there is the relentless demand to increase operational efficiency and product quality year after year while reducing Read More
IC-TAG Solutions Introduces RFID JumpStart Kit
IC-Tag Solutions has introduced an radio frequency identification (RFID) Jumpstart Kit called the “IC-DEMO.” IC-DEMO is a complete RFID demo system that allows

application  and test or develop applications. The IC-DEMO Jumpstart Kit comes with a collection of tags that span a variety of types, forms, and vendors (Avery Dennison, Smartrac, and Alien Technology) which includes on-metal and low-cost tags. All that’s needed to configure and test the solution is IC-DEMO and a laptop. Tag selection is a critical part of any RFID application. The kit allows engineers to set up a working demo and test the impacts of temperature, power, and an assortment of environmental factors Read More
Microsoft Expertise Developing Mobile Application
By integrating data from disparate systems and delivering data in a management dashboard on a personal digital assistant (PDA) or cell phone, Persistent enabled

application  Expertise Developing Mobile Application By integrating data from disparate systems and delivering data in a management dashboard on a personal digital assistant (PDA) or cell phone, Persistent enabled service engineers to collect and update data related to tire usage. This solution seamlessly integrated approximately 1,000 dealers in more than 15 European countries to central data servers and a CRM solution. The result? Improved customer end acquisition and satisfaction. Read More
RFID Case Study: Gillette and Provia Part Two: Challenges and Lessons Learned
Compliance with the market RFID mandate has unfortunately preceded the achievements of applied physics and computer science. One of the main obstacles is the

application  software tools from enterprise application integration vendors to get data from RFID tags and readers into existing business systems, meaning that companies are often forced to do expensive custom integration work. Together with the vendors, they will have to devise ways to filter out false or redundant reads and pass on only useful information to enterprise applications. Managers will have to devise policies on how much data to collect from RFID systems, which signals to record, which to ignore, and Read More
Keys to Accelerating Web Application Delivery
Slowdowns, scalability issues, and security gaps hit Web applications where it hurts. Data center consolidations put distance between application servers and

application  to Accelerating Web Application Delivery Slowdowns, scalability issues, and security gaps hit Web applications where it hurts. Data center consolidations put distance between application servers and users—producing long round-trips and slow response times. Luckily, there is a solution. Deploying a wire-speed application system—in a unified single-platform design—boosts response times, improves infrastructure scalability, and safeguards against security threats. Read More
Popular Searches

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others