Vertical Industries  >  

Fishing Industry

RSS Feed    Add to Google    Add to My Yahoo!
Fishing IndustryWhite Papers (View All Report Types)
 
Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

IT education in Scandavia
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Mobile NFC in Retail
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

ComputerWeekly.com

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

Symantec Corporation

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

CW+: Study: The economic benefits of cloud to business and the economy (part II)
sponsored by ComputerWeekly.com
WHITE PAPER: This is a summary of  Part Two  of Cebr’s report, The Cloud Dividend. The research involved an independent study to quantify the economic benefits of cloud computing to business and to Europe’s five largest economies’ (in alphabetical order, France, Germany, Italy, Spain and the UK).
Posted: 20 Oct 2011 | Published: 14 Mar 2011

ComputerWeekly.com

Big Data in Big Companies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The International Institute for Analytics (IIA) and SAS, assess how 20 large firms have deployed analytics to generate value from their big data assets.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

ComputerWeekly.com

Storage Magazine February 2014: 2013 Storage Products of the Year Awards
sponsored by SearchStorage.com
EZINE: In the February 2014 issue of Storage magazine, we reveal the winners of our 2013 Products of the Year awards, explore 10 disaster recovery don'ts and much more!
Posted: 13 Feb 2014 | Published: 13 Feb 2014

SearchStorage.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Computer Weekly – 24 June 2014: Betting on World Cup success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to gambling site Betfair about the IT challenges of preparing for the football World Cup. We examine the strategy of cloud software pioneer Salesforce.com as it grows its role in the IT department. And we explain erasure coding – an emerging method for protecting storage hardware. Read the issue now.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

ComputerWeekly.com

The various ways to fight new and emerging cybercrime
sponsored by SearchSecurity.com
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

SearchSecurity.com

CW Special Report on Oracle
sponsored by ComputerWeekly.com
WHITE PAPER: This special report, updated for 2012, gives an independent view of the challenges facing Oracle, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 01 Feb 2013 | Published: 01 Feb 2012

ComputerWeekly.com

The BMC and IPMI Vulnerabilities
sponsored by Avocent
WHITE PAPER: Recent analyst studies have shown that there are potential security flaws in BMCs, also known as service processors, and the Intelligent Platform Management Interface protocol. Read this whitepaper to learn how you can contain the risk.
Posted: 13 May 2014 | Published: 31 Dec 2013

Avocent

How HR Functions can Use Scanning to Improve Efficiency
sponsored by Iron Mountain
WHITE PAPER: The following research paper examines the findings of an extensive survey from 100+ HR professionals and provides readers with insight into the progress HR is making in digitization, top concerns and payoffs, and how to approach document management in a much more effective and efficient manner.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Iron Mountain

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Limited
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Limited

Five steps for delivering self-service business intelligence to everyone
sponsored by Information Builders
WHITE PAPER: The following expert white paper explores Wayne Eckerson's 5 steps for delivering self-service business intelligence to everyone in your business. Learn important parts like creating taxonomies, selecting the right tools, and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Information Builders

Top 10 Reasons to Choose an Open Source Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: When building, deploying, and managing Java applications and services, you need a flexible, agile application platform. View this white paper to learn about one such enterprise application platform, and discover 10 reasons to choose this cloud-ready, open source platform.
Posted: 15 Jul 2014 | Published: 30 Sep 2013

Red Hat

CW+: Study: The economic benefits of cloud to business and the economy
sponsored by ComputerWeekly.com
WHITE PAPER: This is a summary of the report on and results of an independent study to quantify the economicbenefits of cloud computing to business and to Europe’s five largest economies (in alphabetical order,France, Germany, Italy, Spain and the UK).
Posted: 27 Sep 2012 | Published: 06 Jan 2011

ComputerWeekly.com

Application Life-Cycle Management: Top Leaders in the Space
sponsored by Rally Software
WHITE PAPER: Read this white paper to find out more information of some of the possible challenges with application life-cycle management. It outlines some of the most significant software providers and researches, analyzes and scores their services.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

Rally Software

Java application development in the cloud
sponsored by SearchBusinessAnalytics
EBOOK: In this expert handbook, discover the ways in which cloud computing is changing Java mobile app development. Read on for information on cloud security, what to expect from Java in the cloud, and true cloud-based app development.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

SearchBusinessAnalytics

Agile Business eBook Excerpt - Transform Your Organization
sponsored by Rally Software
WHITE PAPER: Successful adoption of Agile - involving organizational and cultural change - will transform your organization into one that innovates, leads, adapts, and delivers. This excerpt guides you through an incremental and achievable approach to organizational change.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Rally Software

How to Give a Killer Presentation: Lessons from TED
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting.
Posted: 04 Jun 2014 | Published: 30 Jun 2013

Citrix Online Go To Meeting

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Accenture Technology Vision 2011
sponsored by ComputerWeekly.com
WHITE PAPER: Just as the U.S. space program could not have put a man on the moon using conventional aviation technology, IT leaders and business executives cannot use yesterday’s approaches to realize tomorrow’s objectives.
Posted: 21 Oct 2011 | Published: 25 Feb 2011

ComputerWeekly.com

Federated Data Check-Ins
sponsored by SAS
EBOOK: When it comes to determining the effectiveness of your data, nothing says success quite like leveraging data virtualization to your advantage. But when it comes down to it, this is just one of the many moving parts required to run and get the most value from data. So in short, how do you do it? Check out this e-book to learn what it takes.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

SAS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement