Vertical Industries  >  

Hunting Industry

RSS Feed    Add to Google    Add to My Yahoo!
Hunting Industry Reports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications
sponsored by Intermec
WHITE PAPER: This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Streamlining Information Management for Airlines
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper today to learn how HP Information Workflow Solutions can reduce the time, cost, and hassle of capturing, managing, distributing, and securing documents while improving collaborative communications for airlines.
Posted: 26 Feb 2015 | Published: 30 Jun 2014

Hewlett-Packard Limited

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Healthcare Transformation and the Role of Business Rule Automation
sponsored by Progress
WHITE PAPER: Read this white paper to learn how a Business Rules Management system (BRMS) can help automate and manage business rules, giving organizations the potential implement policies and rules faster, lower IT implementation costs; reduce the turnaround time for change requests; and reduce the costs of unplanned changes and bug fixing
Posted: 26 Jan 2015 | Published: 31 May 2014

Progress

Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Financial services must gain speed and go mobile to satisfy customers
sponsored by ComputerWeekly.com
WHITE PAPER: This nine-page Buyer’s Guide to Financial Services IT assesses the implications and challenges facing CIOs and senior IT professionals.
Posted: 21 Oct 2011 | Published: 19 Jan 2011

ComputerWeekly.com

Presentation: The BBC’s Unified Communications Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

ComputerWeekly.com

Incident Response: How to Fight Back, A SANS Survey
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

The Global State of Information Security Survey 2013: Key Findings
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks.
Posted: 09 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

A Guide to Cyber Security that Fights the Worst Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this informative white paper to find out what cyber threats are emerging as key players and what you can do to stop them.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

LogRhythm, Inc.

Advanced Threat Hunting with Carbon Black
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download this exclusive white paper now to learn how you can improve your security posture by setting the foundational elements necessary to proactively hunt for and eliminate threats.
Posted: 16 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

March Information Security – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

SearchSecurity.com

HR Managers Focus on Recruiting Experience as War for Talent Intensifies
sponsored by SearchBusinessAnalytics
EGUIDE: This expert E-Guide discusses how today's highly competitive talent market has led many human resources (HR) managers to rethink the recruitment process. Also inside, explore the growing roles that applicant tracking systems and social media-based sourcing play in the hunt for quality talent.
Posted: 06 May 2013 | Published: 06 May 2013

SearchBusinessAnalytics

Insurance Companies tackle Business Rules Automation- learn how!
sponsored by Progress
WHITE PAPER: The digital industry is creating a business and technology environment characterised by greater customer power and competition; and greater need to build closer customer relationships across multiple channels.
Posted: 21 Jan 2015 | Published: 31 May 2014

Progress

Powering Modern Services with a Converged Architecture
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this white paper, learn how one server architecture combines storage and modules in one to handle increasing workloads while simplifying maintenance. Read on to learn if this server platform is right for your organization.
Posted: 29 Jan 2015 | Published: 17 Dec 2014

Dell, Inc. and Intel®

Advanced Case Management - Where Customer Satisfaction and Employee Empowerment Come Together
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers the importance of case management regardless of your industry.
Posted: 30 Jul 2014 | Published: 06 Dec 2012

IBM

Why Analytics, Reporting are Important Facets of API Management Tools
sponsored by IBM
EGUIDE: This expert e-guide discusses why analytics and reporting are important facets of API management tools, and how the right platforms will analyze gathered data.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

IBM

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Fulfilment@Work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How content are IT professionals at work ? This report from Ranstad UK benchmarks IT professionals against professionals working in a broad range of industries.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

TOPICS:  Careers
ComputerWeekly.com

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

CW+ Quocirca report: Beating IT recession blues
sponsored by ComputerWeekly.com
WHITE PAPER: IT spending is often an issue for any organisation, but especially in harsh economic times it is even more important to see what benefit IT brings to the business. This report looks at the degree to which UK organisations understand what IT is doing for their business, and in particular how some companies measure this and benefit from it.
Posted: 20 Oct 2011 | Published: 18 Oct 2010

ComputerWeekly.com

CW+: Study: The economic benefits of cloud to business and the economy (part II)
sponsored by ComputerWeekly.com
WHITE PAPER: This is a summary of  Part Two  of Cebr’s report, The Cloud Dividend. The research involved an independent study to quantify the economic benefits of cloud computing to business and to Europe’s five largest economies’ (in alphabetical order, France, Germany, Italy, Spain and the UK).
Posted: 20 Oct 2011 | Published: 14 Mar 2011

ComputerWeekly.com

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement