Vertical Industries  >  

Fishing Industry

RSS Feed    Add to Google    Add to My Yahoo!
Fishing Industry White Papers (View All Report Types)
Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010


Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Information Security Breaches Survey 2013
sponsored by
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Mobile NFC in Retail
sponsored by
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015


Storage Magazine, August 2015
sponsored by
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


Practical Threat Management for Educational Institutions
sponsored by AlienVault
WHITE PAPER: This white paper provides security tips and suggestions designed to work with the needs – and the budget – of an educational institution.
Posted: 09 Jun 2015 | Published: 31 May 2015


IT education in Scandavia
sponsored by
ESSENTIAL GUIDE: Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Strategic Migration Planning Guide: Weblogic to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: Read about the proven five-step process designed to identify migration opportunities, examine the risks associated with various migration scenarios, create a standard enterprise environment, and develop a comprehensive and strategic migration plan to the JBoss Enterprise Application Platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Global Risks 2014
sponsored by
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

The Technology Industry Survey 2015
sponsored by
RESEARCH CONTENT: This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals shared their views on everything from how cautious they are with their personal data to how they feel about their current employer and what really keeps them happy at work.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Computer Weekly – 27 October 2015: Blockchain Sparks Change in Banking Industry
sponsored by
EZINE: In this week's Computer Weekly, find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. Also learn why EasyJet says digital is increasingly important for airlines, and take a look at the forces driving digital disruption and why some sectors are changing faster than others.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Service Performance Insight: 2015 Professional Services Maturity™ Benchmark
sponsored by Workday
WHITE PAPER: In this white paper you will discover how your organization can use data analytic tools to anticipate and prevent employee attrition with hard facts from the 2015 Professional Services benchmark. Read now to devise a data analytics plan for your organization.
Posted: 27 Jul 2015 | Published: 28 Feb 2015


Strategies for Integrating CRM and Cloud ERP
sponsored by SearchCRM
EBOOK: In this e-guide, Maxcer and other industry experts examine how companies can prepare for cloud integration, and provide a useful step-by-step guide on how to integrate ERP.
Posted: 06 Jun 2014 | Published: 06 Jun 2014


Practical Threat Management and Incident Response for the Small-to-Medium-Sized Enterprise
sponsored by AlienVault
WHITE PAPER: In this white paper, examine several security controls and how they can change the outcome of an attack. Continue reading for industry advice for evaluating today's security control options.
Posted: 17 Nov 2015 | Published: 18 Jun 2014


Practical Threat Management for Healthcare Organizations
sponsored by AlienVault
WHITE PAPER: This white paper can help you overcome some of the many hurdles that healthcare security faces. Read on to keep your compliance needs met and your patient data safe.
Posted: 23 Oct 2015 | Published: 31 May 2015


The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

CW+: Study: The economic benefits of cloud to business and the economy (part II)
sponsored by
WHITE PAPER: This is a summary of  Part Two  of Cebr’s report, The Cloud Dividend. The research involved an independent study to quantify the economic benefits of cloud computing to business and to Europe’s five largest economies’ (in alphabetical order, France, Germany, Italy, Spain and the UK).
Posted: 20 Oct 2011 | Published: 14 Mar 2011

Women in IT: Inspiring the next generation
sponsored by
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Leveraging Application Development with Programming Languages in the Cloud
sponsored by SearchBusinessAnalytics
EBOOK: In this expert handbook, see how the advent of cloud computing is affecting Java application development. Learn about the specific ways in which Java development is moving into the cloud, how cloud security is evolving, and what to expect in the near future from Java in the cloud.
Posted: 20 Mar 2013 | Published: 20 Mar 2013


Global Risks Report 2015
sponsored by
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Computer Weekly – 1 September 2015: Wearable Technology Proves its Worth on the Front Line
sponsored by
EZINE: In this week's Computer Weekly, we look at business applications for wearable technology. With hands-free police and military pilot projects already under way, wearable technology is set to make its mark in the enterprise in the near future.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

A Comprehensive Guide to Network Security in 2014-2015
sponsored by Radware
WHITE PAPER: Access this comprehensive white paper for an in-depth review of what plagued security professionals in 2014, and what will continue to challenge them in 2015.
Posted: 02 Apr 2015 | Published: 26 Dec 2014


Big Data in Big Companies
sponsored by
ESSENTIAL GUIDE: The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.
Posted: 20 Aug 2013 | Published: 20 Aug 2013
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement