Vertical Industries  >  

Logging industry

RSS Feed    Add to Google    Add to My Yahoo!
Logging industryWhite Papers (View All Report Types)
 
Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 25 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

Log Management Tightens Data Security, Performance
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Log Management: How to Develop the Right Strategy for Business and Compliance
sponsored by Dell SecureWorks UK
WHITE PAPER: Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks UK

The new era of big data security analytics
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

LogRhythm, Inc.

Advanced Intelligence (AI) EngineTM
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief guide takes an in-depth look at one company's SIEM solution and how it employs log and event management to prevent cyber-attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

LogRhythm, Inc.

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

LogRhythm, Inc.

Security Intelligence: Can "Big Data" Analytics Overcome our Blind Spots?
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world.
Posted: 31 Jan 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

7 Steps to Business Success on the Internet of Things
sponsored by Xively by LogMeIn
WHITE PAPER: The Internet of Things (IoT) allows organizations to gain valuable insights that fuel business growth. How can your company turn ideas into vision and tangible reality that helps your business get the most value from the IoT? Find out in this informative white paper, which outlines 7 steps to success on the IoT.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

Xively by LogMeIn

IBM FlashSystem in securities industry
sponsored by IBM
WHITE PAPER: In this white paper, you will gain insight on solid state storage as drives, disks, and arrays. Check it out now to discover the broad characteristics of solid state storage and how it can improve your I/O performance.
Posted: 26 Jun 2013 | Published: 30 Apr 2013

IBM

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

How social media drives business success
sponsored by ComputerWeekly.com
IT BRIEFING: There is a growing recognition that rather than being a distraction or a time drain, social tools could hold the key to a more productive way of doing business, this report from Google argues.
Posted: 21 May 2012 | Published: 21 May 2012

ComputerWeekly.com

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence For Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Symmons Industries turns up the pressure on larger competitors with IBM Business Analytics software
sponsored by IBM
WHITE PAPER: Access this fascinating case study today to see how Symmons - a mid-sized, US-based manufacturer in the plumbing industry - implemented expert solutions that enabled production-line staff to adapt manufacturing schedules and meet demands in real time, and much more!
Posted: 05 Nov 2013 | Published: 05 Nov 2013

IBM

For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

SuccessFactors

PBMC Health Leverages Technology to Ease Access to and Management of Clinical Data
sponsored by Siemens
CASE STUDY: This case study highlights PBMC Health's experience with an information access solution that combined desktop virtualization, authentication management, and context and location awareness technologies to improve workflows and enhance patient care.
Posted: 07 Mar 2014 | Published: 31 Jan 2014

Siemens

CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Alder Hey Children's NHS Foundation Trust Boosts Care Provision with Electronic Patient Records System
sponsored by Dell, Inc.
WHITE PAPER: This case study highlights the benefits that Alder Hey Children's NHS Foundation Trust gained after implementing a content management system for digitized patient records.
Posted: 25 Mar 2014 | Published: 31 Mar 2013

Dell, Inc.

Empowering Cardiologists to Enhance Patient Care
sponsored by GE
WHITE PAPER: Read this white paper to learn how a web-based IT system can meet the changing cardiovascular technology paradigm by offering flexible, streamlined functions.
Posted: 06 Feb 2014 | Published: 31 Dec 2011

GE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement