Vertical Industries  >   Consumer Packaged Goods Industry  >  

Information Appliances Industry

RSS Feed    Add to Google    Add to My Yahoo!
Information Appliances Industry White Papers (View All Report Types)
 
IBV Study: Capitalizing on the Power of the Smarter Consumer
sponsored by IBM
WHITE PAPER: Business survival in the age of the smart consumer means empowering your customers to shop how and when they want. In this white paper, find the results of a recent survey of more than 30,000 consumers and uncover the key trends shaping the world of retail.
Posted: 07 May 2013 | Published: 28 Feb 2011

IBM

Not Business as Usual. The Changing Channels in Consumer Electronics
sponsored by IBM Line of Business
WHITE PAPER: IBM explores how the impact of innovative business models for "how to sell" are now as important as the innovative products themselves - CE manufacturers need to skillfully manage their mix of sales channels for future success.
Posted: 29 Nov 2007 | Published: 01 Nov 2007

IBM Line of Business

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

How Successful Manufacturing ERP Selections Are Made: The Top Things to Look for, Look at, and Look beyond When Evaluating an ERP Purchase
sponsored by IQMS
WHITE PAPER: This paper examines the major considerations manufacturers looking to add, upgrade of replace Enterprise Resource Planning (ERP) software should be aware of. By being cognizant of these aspects you'll ensure that you'll be able to select a solution that best fits your needs, both now and in the future.
Posted: 24 Dec 2008 | Published: 24 Dec 2008

IQMS

In Dynamic Market, Consumer Goods Companies Rely on Manufacturing Operations Management Systems
sponsored by Apriso Corporation
WHITE PAPER: To succeed in today’s competitive marketplace, consumer goods manufacturers need to pay attention to several areas including operational excellence, compliance, and supply chain synchronization. Learn how today’s powerful and cost-effective solutions, such as Apriso’s MOM offering, can provide companies with benefits in each of these areas.
Posted: 13 Dec 2010 | Published: 13 Dec 2010

Apriso Corporation

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Improve Quality of Care with All-Flash Storage in EHR
sponsored by Pure Storage
WHITE PAPER: With the introduction of all-flash storage technology, mission-critical healthcare applications such as EHR and VDI can experience unparalleled performance and availability. Read now to learn how you can take advantage of all-flash storage to enable improvements in patient care and clinical efficiencies.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

Pure Storage

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Case Study: Tesco's £65 million data centre strategy to drive online growth
sponsored by ComputerWeekly.com
CASE STUDY: This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

ComputerWeekly.com

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

CW ASEAN: Storage - June 2016
sponsored by SearchStorage.com
EZINE: Hyper converged and converged storage in ASEAN: In this issue we look at a software-defined approach to storage management that combines storage, compute, networking and virtualization technologies.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

SearchStorage.com

SSD: Features, Functions and FAQ
sponsored by SearchStorage.com
EGUIDE: This expert E-Guide explores key considerations for integrating solid state storage into a server, and answers frequently asked questions about solid state. Read now to learn more.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchStorage.com

EMC VNX and VNXe Family with Veeam Availability Suite
sponsored by Veeam Software
WHITE PAPER: Learn how Veeam Availability Suite v9 is designed to provide enhanced availability with storage snapshots for backup, replication, and recovery tasks. This white paper covers the issues you can expect to solve by integrating this technology, and how to connect it to a storage array.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

Flash-Only Arrays Replacing Hybrids For Primary Storage
sponsored by Nimble Storage
EGUIDE: The future of storage is trending toward flash-only solutions. Like tape and mainframes, HDDs are on their way out and being replaced with flash technology. Access this comprehensive, expert guide to discover the future of the storage industry.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Nimble Storage

Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other business partners may be taking advantage of your data. Read on and learn mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015

IBM

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

The Technology Industry 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Most permanent IT professionals have seen their salaries rise over the past four years, and 15% are reporting pay rises of more than 10%, the Computer Weekly/Mortimer Spinks 2016 survey reveals.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

ComputerWeekly.com

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by SearchSecurity.com
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Transformers: How machines are changing every sector of the economy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The UK wholesale and retail sector has the greatest number of jobs with a high chance of automation in the next 10 to 20 years, according to this research by Deloitte.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

ComputerWeekly.com

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by SearchSecurity.com
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement