X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 trends in information security 2009


Trends in LMS
Companies and educational institutions use learning management systems (LMSs) to provide training and e-learning. With over 250 LMSs currently on the market

trends in information security 2009  I'll detail some recent trends in the LMS marketplace. Industry Consolidation There is an ongoing trend toward consolidation among the major vendors which began a few years ago. Several major mergers took place in 2004 and 2005. In 2004, Click2Learn and Docent merged to become SumTotal Systems . In 2005, Adobe purchased Macromedia , Saba purchased THINQ Learning Solutions and Centra , and Blackboard purchased WebCT . Blackboard's purchase of WebCT made it the single largest vendor of LMSs for the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » trends in information security 2009

Data, Data Everywhere: A Special Report on Managing Information


The quantity of information in the world is soaring. Merely keeping up with, and storing new information is difficult enough. Analyzing it, to spot patterns and extract useful information, is harder still. Even so, this data deluge has great potential for good—as long as consumers, companies, and governments make the right choices about when to restrict the flow of data, and when to encourage it. Find out more.

trends in information security 2009   Read More

MPS in European and US Enterprises


The printing environment is now an integral part of the IT infrastructure. Organizations that use managed print services (MPSs) are seeing reduced cost and increased efficiencies. Using MPSs optimizes the way in which networked printers, copiers, and multifunction peripherals (MFPs) are managed to minimize the wastage of paper and toner. Find out how effective MPSs offer cost transparency and reliable service levels.

trends in information security 2009   Read More

Using BI and BPM to Address the Information Challenges of Midsize Companies


Business intelligence (BI) and business performance management (BPM) are two disciplines that become critical as companies progress through the midsize stage. BI and BPM provide key capabilities that every midsize company should have, to answer fundamental questions about performance, now and in the future. Learn how your operations are affected by specific challenges—and how a BI/BPM solution can help address them.

trends in information security 2009   Read More

Top 5 Trends in HR Technology


Recession or not, innovation in HR technology continues to grow—altering the way people work. While there are many new solutions available, here are a few that we’ll be seeing more of in the year ahead.

trends in information security 2009   Read More

SAP In-memory Appliance (SAP HANA): The Next Wave of SAP In-memory Computing Technology


Download this datasheet to get a rundown of SAP HANA's functionality and the benefits it can provide for your business.

trends in information security 2009   Read More

Best-in-class Marketers Drive Enhanced Customer Loyalty


The path to a complete view of the customer lies not in eliminating data sources but in integrating them and providing access that is easy to navigate and always available. This report explores how top-performing companies are capturing, integrating, managing, measuring, and acting on valuable customer data throughout the entire customer lifecycle, to maximize customer loyalty and achieve best-in-class bottom-line results.

trends in information security 2009   Read More

Wellesley Information Services


Wellesley Information Services (WIS) is a publishing and training company. Its editorial work includes magazine publishing, mobile content, and case study creation. WIS offers event management and conducts research on market profiles, habits, and product positioning.

trends in information security 2009   Read More

Ernst & Young Leads Big 5 in Security


Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.

trends in information security 2009   Read More

Beyond Spam – Email Security in the Age of Blended Threats


Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them.

trends in information security 2009   Read More

Competing in a Big-box World: How Retailers Can Leverage Technology to Thrive in Today’s Retail Environment


Industry analysts and retail executives agree that, although competitive prices are a must, “low price” as a leading strategy will no longer lead to long-term business success. To successfully compete, midsized retailers must carve out a niche based on creative strategies, including better and more localized product assortments, flawless price management and execution, and optimized inventory down to the store level.

trends in information security 2009   Read More