This article needs to be updated.(May 2014) |
The following tables compare enterprise bookmarking platforms.
The table provides an overview of Enterprise Bookmarking platforms. The platforms listed refer to an application that is installed on a web server (usually requiring MySQL or another database and PHP, perl, Python, or some other language for web apps).
Software | Developed by | Latest stable release | Cost (USD) | Contract support offered | Community website support | Open source | Multilingual | Programming language | User Interface | Notes |
---|---|---|---|---|---|---|---|---|---|---|
Connectbeam | Connectbeam | Spotlight 3.1 (2008-6) | per instance | Yes | No | No | No | binary only | browser | none |
Dogear | IBM Corporation | 2.0.1 (2009-3) | per instance | Yes | Yes | No | Yes | binary only | browser | does not run on mySQL, requires IBM DB2 9.1 FP5, Oracle Database 10g 10.2.0.3, Microsoft SQL Server 2005 Enterprise Edition |
Jumper 2.0 | Jumper Networks | 2.0.1.7 (2010-7) | Free | Yes | Yes | Yes - GPL | Yes | JavaScript & PHP | browser | runs on mySQL database for storing tag profiles. Can also be configured to run on Oracle Database 10g or Microsoft SQL Server 2005 Enterprise Edition |
Knowledge Plaza | Knowledge Plaza | 2.3.18 | free trial, starts at €35/month/instance | Yes | Yes | No | Yes | JavaScript and Python (programming language) | browser | Software-as-a-Service |
Scuttle | Scuttle | 0.9.0 (2013-04) | Free | No | No | Yes - GPL | No | JavaScript & PHP | browser | still in alpha stage |
This table lists the types of data that can be tagged.
Software | Web pages | Documents | Images | Video | Emails | Contacts | Book references | Discussions | Wiki pages | Database tables | Flat-files | Notes |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Connectbeam | Yes | Yes | No | No | Yes | No | No | No | No | No | No | none |
Dogear | Yes | Yes | No | No | No | No | No | No | No | No | No | none |
Jumper 2.0 | Yes | Yes | Yes | Yes | Yes | No | Yes | No | Yes | Yes | Yes | none |
Knowledge Plaza | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No | none |
Scuttle | Yes | No | No | No | No | No | No | No | No | No | No | none |
Tags and metadata can be used to enrich previously described types of data and content. This table lists the default capabilities each platform provides.
Software | Keywords | Descriptions | Custom Tag Fields | Metadata | Knowledge Tags | Notes |
---|---|---|---|---|---|---|
Connectbeam | Yes | Yes | No | No | No | none |
Dogear | Yes | No | No | No | No | none |
Jumper 2.0 | Yes | Yes | Yes | Yes | Yes | none |
Knowledge Plaza | Yes | Yes | Yes | Yes | No | none |
Scuttle | Yes | Yes | No | No | No | none |
Enterprise bookmarking tools differ from social bookmarking tools in the way that they often have to meet taxonomy constraints. Tag management capabilities are the uphill (e.g. faceted classification, predefined tags) and downhill gardening (e.g. tag renaming, moving, merging) abilities that can be put in place to manage the folksonomy generated from user tagging.
Software | Faceted classification | Restricted facets | Mandatory facets | Predefined tags | Related/synonym tags | Notes |
---|---|---|---|---|---|---|
Connectbeam | No | No | No | No | No | none |
Dogear | No | No | No | No | No | none |
Jumper 2.0 | Yes | Yes | Yes | Yes | No | none |
Knowledge Plaza | Yes | Yes | Yes | Yes | Yes | none |
Scuttle | No | No | No | No | No | none |
Security abilities at the platform level:
Security abilities at the application level:
Software | Hosted Platform | On-Premises Platform | Encryption level | Multi-user support | Access permissions | LDAP integration | Information-level permissions | Workspace-level permissions | Role-level permissions | Notes |
---|---|---|---|---|---|---|---|---|---|---|
Connectbeam | Yes | Yes | ? | Yes | Yes | No | ? | ? | ? | none |
Dogear | No | Yes | ? | Yes | Yes | Yes | ? | ? | ? | The Lotus Connection Suite with Dogear runs on the AIX (Unix) operating system |
Jumper 2.0 | No | Yes | HTTPS optionally available | Yes | Yes | Yes | Yes | Yes | Yes | LDAP integration is available |
Knowledge Plaza | Yes | Yes | HTTPS with high-grade 256-bit AES | Yes | Yes | Yes | Yes | Yes | Yes | none |
Scuttle | No | Yes | HTTPS optionally available [1] | No | Yes | No | Yes | ? | none |
In the case of web applications, this describes the server OS. For centrally-hosted websites that are proprietary, this is not applicable. Any client OS can connect to a web service unless stated otherwise in a footnote.
Software | Windows | Mac OS X | Linux | BSD | Unix | IIS | Apache | Notes |
---|---|---|---|---|---|---|---|---|
Connectbeam | Yes | No | No | No | No | Yes | No | none |
Dogear | Yes | Yes | Yes | No | Yes | No | No | requires IBM WebSphere Application Server 6.1.0.13 for the web server |
Jumper 2.0 | Yes | Yes | Yes | Yes | Yes | Yes | Yes | none |
Knowledge Plaza | No | No | Yes | No | No | No | No | No OS management required. Infrastructure-as-a-Service for on-premises installation. |
Scuttle | Yes | Yes | Yes | Yes | Yes | Yes | Yes | none |
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.
Db2 is a family of data management products, including database servers, developed by IBM. It initially supported the relational model, but was extended to support object–relational features and non-relational structures like JSON and XML. The brand name was originally styled as DB2 until 2017, when it changed to its present form.
Adobe ColdFusion is a commercial rapid web-application development computing platform created by J. J. Allaire in 1995. ColdFusion was originally designed to make it easier to connect simple HTML pages to a database. By version 2 (1996) it had become a full platform that included an IDE in addition to a full scripting language.
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.
The following tables compare general and technical information for many wiki software packages.
Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users.
Adobe LiveCycle Enterprise Suite (ES4) is a service-oriented architecture Java EE server software product from Adobe Systems used to build applications that automate a broad range of business processes for enterprises and government agencies. LiveCycle ES4 is an enterprise document and form platform that helps you capture and process information, deliver personalized communications, and protect and track sensitive information. It is utilized for purposes such as account opening, services, and benefits enrollment, correspondence management, requests for proposal processes, and other manual-based workflows. LiveCycle ES4 incorporates new features with a particular focus on mobile devices. LiveCycle applications function in both online and offline environments. These capabilities are enabled through the use of Adobe Reader, HTML/PhoneGap, and Flash Player clients to reach desktop computers and mobile devices.
Google Workspace is a collection of cloud computing, productivity and collaboration tools, software and products developed and marketed by Google. It consists of Gmail, Contacts, Calendar, Meet and Chat for communication; Drive for storage; and the Google Docs Editors suite for content creation. An Admin Panel is provided for managing users and services. Depending on edition Google Workspace may also include the digital interactive whiteboard Jamboard and an option to purchase add-ons such as the telephony service Voice. The education edition adds a learning platform Google Classroom and today has the name Workspace for Education. It previously included Google Currents for employee engagement.
This page is a comparison of notable remote desktop software available for various platforms.
HCL Connections is a Web 2.0 enterprise social software application developed originally by IBM and acquired by HCL Technologies in July 2019. Connections is an enterprise-collaboration platform which aims to helps teams work more efficiently. Connections is part of HCL collaboration suite which also includes Notes / Domino, Sametime, Portal and Connections.
SharePoint is a collection of enterprise content management and knowledge management tools developed by Microsoft. Launched in 2001, it was initially bundled with Windows Server as Windows SharePoint Server, then renamed to Microsoft Office SharePoint Server, and then finally renamed to SharePoint. It is provided as part of Microsoft 365, but can also be configured to run as On-premises software.
Enterprise bookmarking is a method for Web 2.0 users to tag, organize, store, and search bookmarks of both web pages on the Internet and data resources stored in a distributed database or fileserver. This is done collectively and collaboratively in a process by which users add tag (metadata) and knowledge tags.
Linoma Software was a developer of secure managed file transfer and IBM i software solutions. The company was acquired by HelpSystems in June 2016. Mid-sized companies, large enterprises and government entities use Linoma's software products to protect sensitive data and comply with data security regulations such as PCI DSS, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including Windows, Linux, UNIX, IBM i, AIX, Solaris, HP-UX and Mac OS X.
Database activity monitoring is a database security technology for monitoring and analyzing database activity. DAM may combine data from network-based monitoring and native audit information to provide a comprehensive picture of database activity. The data gathered by DAM is used to analyze and report on database activity, support breach investigations, and alert on anomalies. DAM is typically performed continuously and in real-time.
Mobile Business Intelligence is defined as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets, to enable effective decision-making and management support, for the overall purpose of increasing firm performance.”. Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments or associated costs and incomes.
Check Point GO is a USB drive that combines an encrypted USB flash drive with virtualization, VPN and computer security technologies to turn a PC into a secure corporate desktop. By plugging Check Point GO into the USB port of a Microsoft Windows OS-based PC or laptop, users can launch a secure virtual workspace that is segregated from the host PC. This allows users to securely access company files and applications from any remote location, including insecure host environments such as a hotel business center or Internet café.
ownCloud, a Kiteworks Company, is a free and open-source software project for content collaboration and sharing and syncing of files in distributed and federated enterprise scenarios. It allows companies and remote end-users to organize their documents on servers, computers, and mobile devices and work with them collaboratively while keeping a centrally organized and synchronized state.
Microsoft Power BI is an interactive data visualization software product developed by Microsoft with a primary focus on business intelligence. It is part of the Microsoft Power Platform. Power BI is a collection of software services, apps, and connectors that work together to turn various sources of data into static and interactive data visualizations. Data may be input by reading directly from a database, webpage, PDF, or structured files such as spreadsheets, CSV, XML, JSON, XLSX, and SharePoint.