Vertical Industries  >  

Fishing Industry

RSS Feed    Add to Google    Add to My Yahoo!
Fishing Industry White Papers (View All Report Types)
Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016


Security Health Check Report: Data & Breaches
sponsored by Trustwave
WHITE PAPER: This report gives you perspectives from both technical and non-technical professionals in the healthcare industry to help you better understand the current state of healthcare security. Learn how to prioritize your most pressing data security issues and take action to prevent future breaches.
Posted: 03 Oct 2016 | Published: 30 Sep 2016


How Finance Teams Can Help Their Organizations Get Future-Ready
sponsored by IBM
WHITE PAPER: This white paper explores how finance teams can improve performance management, embrace lean practices, implement a scrum methodology, and more. Access now to find out what the best practices are for making your business future-ready.
Posted: 16 Jun 2016 | Published: 30 Jan 2015


Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Information Security Breaches Survey 2013
sponsored by
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

SaaS ERP: The Right Ingredients for Efficiency and Growth
sponsored by Infor
WHITE PAPER: From meat and poultry manufacturers to dairy, bakery, and beverage manufacturers, food and beverage companies need to be nimble with their business systems to drive down costs, increase innovation, and boost efficiency. Access this resource and discover three ways the cloud can simplify business and save money.
Posted: 07 Sep 2016 | Published: 07 Sep 2016


Mobile NFC in Retail
sponsored by
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

CIO Trends ANZ Q1 2016
sponsored by
ESSENTIAL GUIDE: This guide offers a collection of our most popular articles for IT leaders in Australia and New Zealand during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


CIO Trends Q1 2016
sponsored by
EGUIDE: This guide offers a collection of our most popular articles for IT leaders during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

CIO Trends Asean Q1 2016
sponsored by
ESSENTIAL GUIDE: This guide offers a collection of our most popular articles for IT leaders in Asean during the first few months of 2016, examining the changing role of CIOs and how to enhance their relationships with their peers across the business.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

IT education in Scandavia
sponsored by
ESSENTIAL GUIDE: Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

The Global Risks Report 2016
sponsored by
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Global Risks 2014
sponsored by
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Modernizing the Industrial Ethernet Network with Increased Visibility
sponsored by Panduit
RESOURCE: This technical resource discusses how you can implement an Ethernet network that can tie your whole manufacturing operation together. This connected strategy has the ability to deliver unprecedented levels of monitoring, management, visibility and efficiency.
Posted: 05 Oct 2016 | Published: 29 Jul 2016


The Technology Industry Survey 2015
sponsored by
RESEARCH CONTENT: This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals shared their views on everything from how cautious they are with their personal data to how they feel about their current employer and what really keeps them happy at work.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Cyber Attackers Follow Companies into the Cloud
sponsored by Alert Logic
ANALYST REPORT: Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Alert Logic

CW+: Study: The economic benefits of cloud to business and the economy (part II)
sponsored by
WHITE PAPER: This is a summary of  Part Two  of Cebr’s report, The Cloud Dividend. The research involved an independent study to quantify the economic benefits of cloud computing to business and to Europe’s five largest economies’ (in alphabetical order, France, Germany, Italy, Spain and the UK).
Posted: 20 Oct 2011 | Published: 14 Mar 2011

White Lies, Fibs, and Half-Truths YourChat Vendor May Be Selling You
sponsored by [24]7 Customer, Inc.
WHITE PAPER: Access this white paper to learn about the 5 most common lies chat vendors rely on. Proctect yourself from these cheap sales techniques by knowing what to ask these chat vendors about and decide whether they can deliver on the promises they make.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

[24]7 Customer, Inc.

Strategic App Modernization Initiatives to Help Your Business
sponsored by MuleSoft
WHITE PAPER: This guide digs into the ways you can modernize your apps for today's competitive, fast-paced market. Learn about setting up an API strategy, developing for mobile, and more.
Posted: 19 Apr 2016 | Published: 19 Apr 2016


Women in IT: Inspiring the next generation
sponsored by
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Global Risks Report 2015
sponsored by
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Big Data in Big Companies
sponsored by
ESSENTIAL GUIDE: The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

Essential Guide to Threat Management
sponsored by
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

The various ways to fight new and emerging cybercrime
sponsored by
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

CW Special Report on Oracle
sponsored by
WHITE PAPER: This special report, updated for 2012, gives an independent view of the challenges facing Oracle, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 01 Feb 2013 | Published: 01 Feb 2012

The Hunt for Data Analytics: Is Your SIEM on the Endangered List?
sponsored by Exabeam
EGUIDE: Some companies are pursuing data analytics as a complete security strategy, but many more are taking a hybrid approach. Learn how you can – and why you should – add more data analysis to your SIEM tools in order to reinforce your security defenses.
Posted: 31 May 2016 | Published: 20 May 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement