Vertical Industries  >  

Hunting Industry

RSS Feed    Add to Google    Add to My Yahoo!
Hunting IndustryWhite Papers (View All Report Types)
 
Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

The Secrets of Agile Management
sponsored by Hewlett-Packard Company
ANALYST REPORT: In this article, industry leader Matthew Stibbe reveals how the principles of software development can offer new ideas to business management.
Posted: 07 Feb 2014 | Published: 06 Dec 2013

Hewlett-Packard Company

Continuous delivery in ALM Opportunities and challenges
sponsored by IBM
EGUIDE: The hunt for better and faster software production is over—known as "continuous delivery," it uses automation to improve development. In the following expert e-guide, explore the benefits and challenges to incorporating continuous delivery in your existing application lifecycle management strategies.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

The 8 Worst Practices in Master Data Management and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: The road to a successful master data management (MDM) program can be full of detours and dead ends. In this white paper, Dan Power and Julie Hunt from Hub Designs identify the eight worst practices when planning and designing a MDM and data governance program, and show you how to get it right.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Information Builders

HR Managers Focus on Recruiting Experience as War for Talent Intensifies
sponsored by SearchBusinessAnalytics
EGUIDE: This expert E-Guide discusses how today's highly competitive talent market has led many human resources (HR) managers to rethink the recruitment process. Also inside, explore the growing roles that applicant tracking systems and social media-based sourcing play in the hunt for quality talent.
Posted: 06 May 2013 | Published: 06 May 2013

SearchBusinessAnalytics

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Advanced Case Management - Where Customer Satisfaction and Employee Empowerment Come Together
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers the importance of case management regardless of your industry.
Posted: 30 Jul 2014 | Published: 06 Dec 2012

IBM

The Global State of Information Security Survey 2013: Key Findings
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.
Posted: 09 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Fulfilment@Work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How content are IT professionals at work ? This report from Ranstad UK benchmarks IT professionals against professionals working in a broad range of industries.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

TOPICS:  Careers
ComputerWeekly.com

Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Financial services must gain speed and go mobile to satisfy customers
sponsored by ComputerWeekly.com
WHITE PAPER: This nine-page Buyer’s Guide to Financial Services IT assesses the implications and challenges facing CIOs and senior IT professionals.
Posted: 21 Oct 2011 | Published: 19 Jan 2011

ComputerWeekly.com

Presentation: The BBC’s Unified Communications Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

ComputerWeekly.com

CW+ Quocirca report: Beating IT recession blues
sponsored by ComputerWeekly.com
WHITE PAPER: IT spending is often an issue for any organisation, but especially in harsh economic times it is even more important to see what benefit IT brings to the business. This report looks at the degree to which UK organisations understand what IT is doing for their business, and in particular how some companies measure this and benefit from it.
Posted: 20 Oct 2011 | Published: 18 Oct 2010

ComputerWeekly.com

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

CW+: Study: The economic benefits of cloud to business and the economy (part II)
sponsored by ComputerWeekly.com
WHITE PAPER: This is a summary of  Part Two  of Cebr’s report, The Cloud Dividend. The research involved an independent study to quantify the economic benefits of cloud computing to business and to Europe’s five largest economies’ (in alphabetical order, France, Germany, Italy, Spain and the UK).
Posted: 20 Oct 2011 | Published: 14 Mar 2011

ComputerWeekly.com

Transition Cloudward
sponsored by SearchITChannel.com
EBOOK: If you are a solution provider developing a cloud practice, this handbook offers insight on minimizing disruption to your business model when transitioning to cloud, why it is important to transition right now, and transforming your sales strategy.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

SearchITChannel.com

Accelerate Success in the Subscription Economy
sponsored by Zuora, Inc
WHITE PAPER: Find out what you should consider before adopting the subscription based model.
Posted: 30 Oct 2014 | Published: 31 Dec 2013

Zuora, Inc

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Outsourcing the problem of software security
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.
Posted: 10 Jul 2012 | Published: 10 Jul 2012

ComputerWeekly.com

Pulse E-zine May 2014- Sign of the Times
sponsored by SearchHealthIT.com
EZINE: Though health IT professionals are pushing harder than ever for mobile healthcare, they aren't retiring the tried-and-true communications badge.
Posted: 07 May 2014 | Published: 07 May 2014

SearchHealthIT.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement