X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 red hat docs


The 11th Vendor Shootout for ERP: Observations - Part 2
Part 1 of this blog series talked about my attendance of the 11th Vendor ShootoutTM for ERP event, which took place in Boston in mid-August 2011. I was able to

red hat docs  2008 and Linux (the Red Hat, SuSE , and Debian versions). The product can also be deployed in a both single-tenant and multi-tenant SaaS manner. On the client side, abas ERP can work on Windows PCs, Ascii terminals, Linux PCs, and Apple Mac PCs. Data collection can be done via bar code scanners, radio frequency identification (RFID) readers, smart phones, and badge readers. The shown integration of Dassault Systemes’ Solidworks   computer-aided design (CAD)  system directly into the software reduces

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » red hat docs

ABAS Business Software-One Mid-market ERP Vendor to Watch For


ABAS Business Software has built a name for itself as a mid-market enterprise resource planning (ERP) vendor to contend with. In his latest article, TEC principal analyst P.J. Jakovljevic reviews the company’s major ERP offering, describes how the mid-market ERP vendor the differentiated itself from the pack, and talks with Alan Salton to get the president’s perspective on the company’s products, challenges, and strategies.

red hat docs   Read More

Can We Intelligently Use Part Numbers to Configure and Order the Right Products?


In the industrial automation industry, an overlooked, fatal flaw of sales configurator solutions is their inability to simultaneously configure part numbers and products. A greater concern is their inability to "decipher" product specifications from part numbers—that is, in reverse.

red hat docs   Read More

So What: The Big Test of Your Positioning Strategy


Failing to ask "so what?" of a positioning statement can mean losing an opportunity to communicate what is really important to the target market, and to gain some credibility.

red hat docs   Read More

Come See the Softer Side of Linux?


Three hardware manufacturers, trying to upgrade the scalability and manageability of Linux servers, announced major Linux server initiatives at LinuxWorld in New York.

red hat docs   Read More

Infor LN ERP Gets Open Source and Cloud Underpinnings


At the recent Red Hat Summit 2014, Infor announced a joint collaboration with Red Hat, a leading provider of open source solutions, and EnterpriseDB, a PostgreSQL database company, to make Infor LN ERP available on a total open technology stack.

red hat docs   Read More

The Guide to Google Apps Training Part Four: Advanced Security Configuration and Compliance


Google offers protection of your information with its sophisticated data and encryption centers. But now that you’ve become comfortable with the tools and basic security settings for Google Apps, you can get more in-depth and establish other security settings on your own. This next level of control allows you to review the settings for the core of Google Apps and gives you even better protection over your data with the ability to configure security parameters for associated apps.

In this Google Apps Guide, get detailed information about commonly asked questions regarding Google security topics. Learn how to set levels of calendar sharing internally and externally, how to configure and restrict collaboration capabilities of Google Docs on- and off-line, and how to execute configurations of Gmail access for mobile device management and compliance for even more protection. A step-by-step process is provided for the creation and facilitation of groups, as well as granting or revoking a user’s individual permissions for security access to third-party apps. Review, enable (or disable), and configure a series of core Google Services, including: Chrome management, Google+, Google Vault, and Google Apps Marketplace. The Google Apps Guide also describes how to enable or disable some non-core extra Google Apps.

red hat docs   Read More

J2EE/Java EE Performance


This white paper looks at ways to increase system performance without touching the code, and to formulate a strategy for adopting best practices provided by Apache, Red Hat JBoss, Sun JDK, and various other distributed components.

red hat docs   Read More

Red Hat’s Linux Domination Weakens


Red Hat still controls the Linux market, but now it’s getting some competition from SuSE, Caldera, and TurboLinux.

red hat docs   Read More

I Want My Private Cloud


Although many organizations are considering reaping the benefits of a cloud computing platform, they have concerns with the handling of sensitive information on a public cloud platform. An alternate option is available, and it means having our own private cloud. This article discusses aspects of private cloud computing and its advantages and drawbacks for organizations considering the adoption of a private cloud strategy.

red hat docs   Read More

Caldera eDesktop Edges Out Microsoft Windows 2000 in Functionality - Part II


TechnologyEvaluation.com has completed its analysis of the innate functionality of three desktop operating systems – Microsoft Windows 2000, Red Hat Linux 6.2, and Caldera OpenLinux eDesktop 2.4. The winner is Caldera.

red hat docs   Read More