Vertical Industries  >  

Cigarette Industry

RSS Feed    Add to Google    Add to My Yahoo!
Cigarette Industry White Papers (View All Report Types)
 
Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Infor

How Finance teams can help their organizations get future-ready
sponsored by IBM
WHITE PAPER: Finance teams need to ready themselves for the future. Access this report to learn how finance teams can become future-ready by improving in keys areas and debunk seven myths about performance management.
Posted: 16 Jun 2016 | Published: 30 Jan 2015

IBM

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Philipp Morris case study
sponsored by MobileIron
WHITE PAPER: An industry leading company needed to increase mobile productivity for employees spread across the world. Read this case study to learn about an EMM solution allowed this company to achieve increased productivity on a global scale for more than 87,000 employees.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

Data Breach Investigation Report
sponsored by Verizon
RESOURCE: This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.
Posted: 03 May 2016 | Published: 03 May 2016

Verizon

Dangers of the Deep, Dark Web
sponsored by IBM
WHITE PAPER: Access this white paper to learn how two of the most frequently used Deep Web networks operate and how you can stay safe from attacks that originate there.
Posted: 15 Dec 2015 | Published: 31 May 2015

IBM

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

The New Building Blocks of Network Design
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper explores network virtualization as a strategy to make corporations more agile and IT expenditure efficient.
Posted: 26 Mar 2014 | Published: 12 Jan 2009

Cisco Systems, Inc.

Philip Morris International Mobilizes A Global Workforce With MobileIron Solutions
sponsored by MobileIron
CASE STUDY: In this case study, find out how Philip Morris International utilized one solution that enabled employees to go mobile.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

MobileIron

MicroScope August: Security Update
sponsored by MicroScope
EZINE: An issue looking at how the channel can overcome the skills problems and a chance to hear from a range of leading vendors on how the security market is faring
Posted: 06 Aug 2015 | Published: 07 Aug 2015

MicroScope

The Business Value of HP–UX 11i
sponsored by HP & Intel®
WHITE PAPER: When HP-UX 11i on Integrity Servers was matched up against Linux on IBM x86 Servers, the results were interesting. Read this paper and find out which lowered TCO and gave higher ROI through superior consolidation, virtualization, scalability, availability, and intelligent manageability.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

HP & Intel®

Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

ComputerWeekly.com

Presentation Transcript: Layering Enterprise Security with Next Generation Access Management
sponsored by Oracle Corporation
PRESENTATION TRANSCRIPT: Read this paper to learn more about the current state of security and identity management. The presenters discuss solutions related to enterprise security issues and the benefits of Oracle products.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

Oracle Corporation

Presentation Transcript: Special Edition Brian and Gabe Live: Utilize existing PCs to realize IT and user benefits without a client hypervisor
sponsored by Intel and Wanova
PRESENTATION TRANSCRIPT: This presentation transcript, featuring desktop virtualization experts Brian Madden and Gabe Knuth, introduces new desktop software that allows you to enjoy the best of both worlds when it comes to virtualization and the PC. Discover how you can leverage VDI while still enjoying your native PC performance.
Posted: 25 May 2012 | Published: 25 May 2012

Intel and Wanova

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

Records Managers Gain Stature
sponsored by SearchContentManagement
EBOOK: In this expert e-guide, learn how to deal with the ever-growing pileup of content and data many organizations are contending with. Topics covered include how new requirements are effecting records management roles, compliance is a growing concern when it comes to content management, and more.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

SearchContentManagement

Presentation Transcript: What’s Really “Green” In a Data Center?
sponsored by IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn what Robert McFarlane, Principal Data Center and Financial Trading Floor Consultant, thinks it means to really have a green data center.
Posted: 28 Jan 2010 | Published: 25 Jan 2010

IBM

Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement