Vertical Industries  >   Consumer Packaged Goods Industry  >  

Electrical Appliances Industry

RSS Feed    Add to Google    Add to My Yahoo!
Electrical Appliances Industry White Papers (View All Report Types)
 
Not Business as Usual. The Changing Channels in Consumer Electronics
sponsored by IBM Line of Business
WHITE PAPER: IBM explores how the impact of innovative business models for "how to sell" are now as important as the innovative products themselves - CE manufacturers need to skillfully manage their mix of sales channels for future success.
Posted: 29 Nov 2007 | Published: 01 Nov 2007

IBM Line of Business

IBV Study: Capitalizing on the Power of the Smarter Consumer
sponsored by IBM
WHITE PAPER: Business survival in the age of the smart consumer means empowering your customers to shop how and when they want. In this white paper, find the results of a recent survey of more than 30,000 consumers and uncover the key trends shaping the world of retail.
Posted: 07 May 2013 | Published: 28 Feb 2011

IBM

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

How Finance Teams Can Help Their Organizations Get Future-Ready
sponsored by IBM
WHITE PAPER: This white paper explores how finance teams can improve performance management, embrace lean practices, implement a scrum methodology, and more. Access now to find out what the best practices are for making your business future-ready.
Posted: 16 Jun 2016 | Published: 30 Jan 2015

IBM

How Successful Manufacturing ERP Selections Are Made: The Top Things to Look for, Look at, and Look beyond When Evaluating an ERP Purchase
sponsored by IQMS
WHITE PAPER: This paper examines the major considerations manufacturers looking to add, upgrade of replace Enterprise Resource Planning (ERP) software should be aware of. By being cognizant of these aspects you'll ensure that you'll be able to select a solution that best fits your needs, both now and in the future.
Posted: 24 Dec 2008 | Published: 24 Dec 2008

IQMS

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Case Study: Tesco's £65 million data centre strategy to drive online growth
sponsored by ComputerWeekly.com
CASE STUDY: This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Big Data BlackOut: Are Utilities Powering Up Their Data Analytics?
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from Capgemini Consulting identifies a disparity between the utilities industry's perception of big data analytics and its implementation of the technology.
Posted: 26 May 2015 | Published: 26 May 2015

ComputerWeekly.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Building A Resilient Smart Grid
sponsored by Red Hat
WHITE PAPER: Download this resource to discover reference architectures to improve collection, distribution and storage of data within energy providers' IT infrastructures. Additionally, learn how providers can embrace digital transformation to improve electric utilities services.
Posted: 13 Apr 2017 | Published: 13 Apr 2017

Red Hat

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Computer Weekly – 7 June 2016: Apple lures open source developers with Swift
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Apple's plan to woo open source developers to its Swift programming language. DevOps practitioners are warning of growing stress on IT operations staff through the growth of continuous development practices. And Specsavers' CIO tells us why the store is a vital part of digital retail. Read the issue now.
Posted: 03 Jun 2016 | Published: 07 Jun 2016

ComputerWeekly.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Streamline Data Center Maintenance with Multivendor Technology Support
sponsored by IBM
VIDEO: Here's how to realize proactive multi-vendor IT support: Watch this video to streamline maintenance support for hardware, software, and your multiple vendor relationships with a single point of contact. Discover a technical appliance purpose-built for your heterogeneous data center environment.
Posted: 28 Mar 2017 | Premiered: 18 Jan 2016

IBM

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

Network Security Trends: Understanding the State of Network Security Today
sponsored by Gigamon
RESEARCH CONTENT: Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals to evaluate the challenges, changes, best practices, and solution requirements for network security operations and network security tools. Get access to this survey report for key insights into the state of network security today.
Posted: 09 Jun 2017 | Published: 31 Jan 2017

Gigamon

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

CW@50: What was making the news in June
sponsored by ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

ComputerWeekly.com

Agile Infrastructure and Storage for Healthcare IT
sponsored by Pure Storage
WHITE PAPER: This white paper explores how healthcare IT teams can architect more agile infrastructures that can keep pace with the velocity of care.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Pure Storage

Computer Weekly: Counting the Real Cost of Financial Cyber Crime
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 11 Nov 2016 | Published: 15 Nov 2016

ComputerWeekly.com

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

A Guide to the Differing Types of Prefabricated Modular Data Centers
sponsored by Schneider Electric
WHITE PAPER: Access this feature white paper to compare and define the key attributes of prefabricated modular data centers, and provide a framework for choosing the best approaches based on your business requirements.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement