Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Republic of Dominica
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Enterprise applications have long been providing the means for businesses to collect required data and deliver it to the right people. Now that sales and marketing professionals are empowered with the right tools to better serve their customers and gather insights on all customers' interactions, the question to ask is what's next? We see the answer in a tight integration between Enterprise applications and Analytics.
: Analyse This Analyse This Kevin Ramesan - July 23, 2003 Read Comments Product Definition and Market Impact With company s data warehouses now filled with terabytes of historic data it is crucial to adopt tools that would allow marketers to better understand their customers and build adapted strategies for a true one to one relationship management. The increasing demand to allow end users to access, analyze, and deliver information in an organization has amplified the need for the business intelligence
Traffic Audits Make Strange Bedfellows: Part II - The Audit Process
With traffic being the lifeblood of an e-commerce site the Marketing crew knows that the traffic numbers are going to be audited. And they look to the CIO to make sure that the numbers will pass muster. If there’s a problem with the numbers, the CIO may be blamed. So it’s important to understand what auditors want to see, and to make sure that your collection and reporting procedures are appropriate. The greatest danger is having to restate numbers that you’ve already provided to advertisers.
: Traffic Audits Make Strange Bedfellows: Part II - The Audit Process Traffic Audits Make Strange Bedfellows: Part II - The Audit Process D. Geller - September 14, 2000 Read Comments This is Part II of a two part article. Part I : The Why s and What s of Auditing Part II : The Audit Process What s in an audit? The audit is a process for verification of the numbers that you report to your advertisers. Audits can be performed in a number of different ways. Server-based audits examine data that is available at
Web Traffic Numbers Down? Don t Count On It!
News sources are reporting that September Web traffic was down. This seems to be a case of putting too much weight to too little data.
: Web Traffic Numbers Down? Don t Count On It! Web Traffic Numbers Down? Don t Count On It! D. Geller - October 22, 1999 Read Comments Event Summary The respected Internet and Digital Media measurement firm Media Metrix announced its monthly survey of traffic on the Top Fifty At Home and At Work web site traffic ratings. The listings show traffic reports for individual web sites and for properties. A property represents all of the sites belonging to a particular company like Yahoo, AOL or Microsoft.
Counting Website Traffic
Knowing how many people visit your website can help you improve the site and increase revenues. Counting them can be easy or accurate, but not both.
: to bias its internal analyses with a value produced by the most extreme of the possible choices. Different products differ on how they handle this. The next level of information the company might want to know is what site visitors actually do. In other words, what kind of paths do they take through the site? For many sites, only fairly short paths are needed for this kind of analysis. For example, do more come to the perfume sales page by doing a search or after reading the article you posted about
Will Max Get Mad When He Surfs Your Website?
WebCriteria announced that it has launched a new study of user interaction with Websites. As with previous studies, the results will be used to build a software model of a surfer (named Max) and integrated into products that help assess the quality of a real surfer’s experience.
: product also provides comparative analyses of competing sites. The company publishes aggregated statistics for various vertical segments for free on its website. Market Impact WebCriteria s approach should interest website marketers. As a result, the products should do well. This will not be an easy product to replicate, although there will probably be some look-alikes if WebCriteria seems to be catching on. And, especially if they can build interesting models from their new research, we expect them to
How MWL Fights E-threats
When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and acts as an interface between your computer and the Net, it cannot distinguish the difference between good traffic and bad. MicroWorld Winsock Layer (MWL) technology helps by sitting on the Winsock layer and analyzing the traffic—before it gets to your computer.
: How MWL Fights E-threats How MWL Fights E-threats Source: MicroWorld Technologies, Inc. Document Type: White Paper Description: When you connect to the Internet, you do so through the Windows Socket (Winsock) layer. While this layer is an integral part of the Windows operating system and acts as an interface between your computer and the Net, it cannot distinguish the difference between good traffic and bad. MicroWorld Winsock Layer (MWL) technology helps by sitting on the Winsock layer and analyzing the
11/23/2007 12:50:00 AM
InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs
The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network.
: InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs InsideOut Firewall Reporter Unravels the Mysteries of Your Firewall Logs Troy Thompson - June 22, 2003 Read Comments Executive Summary The most important piece of hardware that protects your network from intruders, hackers, and outside traffic is your firewall. Firewalls process an enormous amount of data, that when converted to useful information, can tell you many things about the packets traveling in and out of your network.
Transportation Control and Transportation Optimize
: Nulogx Transportation Control is an end-to-end third party logistics provider (3PL) solution that supports the activities necessary to manage and execute the full life cycle of the transportation process across multiple 3PL customers.
Software as a Service: Next-generation Network Performance Management
An estimated 55 percent of users of business critical applications work in remote locations. With so many users working remotely, networks become congested and user productivity suffers. Until now, wide area network (WAN) monitoring and shaping has required special appliances, but there’s a new alternative software-based solution available that leverages the power of the user’s PC—providing unprecedented traffic control.
: Software as a Service: Next-generation Network Performance Management Software as a Service: Next-generation Network Performance Management Source: NetPriva Document Type: White Paper Description: An estimated 55 percent of users of business critical applications work in remote locations. With so many users working remotely, networks become congested and user productivity suffers. Until now, wide area network (WAN) monitoring and shaping has required special appliances, but there’s a new alternative
10/24/2007 9:07:00 AM
Benchmarking: How Am I Really Performing?
Benchmarking, as defined by the dictionary, is
: Benchmarking: How Am I Really Performing? Benchmarking: How Am I Really Performing? James E. Dion - June 26, 2006 Read Comments What Is Benchmarking? Do you remember when you were in grammar school or high school, and at the end of every semester you received your report card ? Some dreaded that day and some welcomed it! Either way, it was the method that the school used to tell us and our parents how well (or not so well) we were doing in our job of getting an education. The report card was really just
Advertising Online - A Guide to Successful Market PenetrationPart Three: Geo Targeting and Fraud Protection
The same type of technology used to identify and suppress certain types of traffic can also be used for good - geo targeting can supply geographically specific traffic to your site.
: Advertising Online - A Guide to Successful Market Penetration Part Three: Geo Targeting and Fraud Protection Advertising Online - A Guide to Successful Market Penetration Part Three: Geo Targeting and Fraud Protection Deborah Kilpatrick - January 18, 2003 Read Comments Geo Targeting and Fraud Protection Programs Pay-Per-Click search engine traffic is a popular means of bringing qualified users to sites. Technology has evolved tremendously, allowing the targeting and tracking abilities of an engine to
White Paper Newsletters