Vertical Industries  >   Consumer Packaged Goods Industry  >  

Information Appliances Industry

RSS Feed    Add to Google    Add to My Yahoo!
Information Appliances Industry Reports
 
IBV Study: Capitalizing on the Power of the Smarter Consumer
sponsored by IBM
WHITE PAPER: Business survival in the age of the smart consumer means empowering your customers to shop how and when they want. In this white paper, find the results of a recent survey of more than 30,000 consumers and uncover the key trends shaping the world of retail.
Posted: 07 May 2013 | Published: 28 Feb 2011

IBM

Not Business as Usual. The Changing Channels in Consumer Electronics
sponsored by IBM Line of Business
WHITE PAPER: IBM explores how the impact of innovative business models for "how to sell" are now as important as the innovative products themselves - CE manufacturers need to skillfully manage their mix of sales channels for future success.
Posted: 29 Nov 2007 | Published: 01 Nov 2007

IBM Line of Business

Computer Weekly - 10 January 2012: What’s in store for IT this year?
sponsored by ComputerWeekly.com
EZINE: In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.
Posted: 14 Sep 2012 | Published: 10 Jan 2012

ComputerWeekly.com

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

In Dynamic Market, Consumer Goods Companies Rely on Manufacturing Operations Management Systems
sponsored by Apriso Corporation
WHITE PAPER: To succeed in today’s competitive marketplace, consumer goods manufacturers need to pay attention to several areas including operational excellence, compliance, and supply chain synchronization. Learn how today’s powerful and cost-effective solutions, such as Apriso’s MOM offering, can provide companies with benefits in each of these areas.
Posted: 13 Dec 2010 | Published: 13 Dec 2010

Apriso Corporation

Graphic Packaging International Achieving Operational Excellence
sponsored by SAP America, Inc.
CASE STUDY: In this case study, Graphic Packaging International Inc (GPI) needed a single end-to-end solution across the enterprise after their acquisition of Riverwood Holding Inc. Learn how SAP ERP application was their solution.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Managing a Bountiful Harvest: Blending Long-term Planning with Short-term Scheduling: Constraint Based Planning and Scheduling for Food Manufacturers
sponsored by Logility, Inc.
WHITE PAPER: This white paper explains strategies for effectively using existing manufacturing capacity with a constraint-based production planning and a scheduling method to predict and minimize the impacts of seasonal harvests on manufacturing.
Posted: 30 Apr 2008 | Published: 01 Jan 2006

Logility, Inc.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Streamline Data Center Maintenance with Multivendor Technology Support
sponsored by IBM
VIDEO: Here's how to realize proactive multi-vendor IT support: Watch this video to streamline maintenance support for hardware, software, and your multiple vendor relationships with a single point of contact. Discover a technical appliance purpose-built for your heterogeneous data center environment.
Posted: 28 Mar 2017 | Premiered: 18 Jan 2016

IBM

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.
Posted: 28 Mar 2017 | Published: 30 Sep 2016

VMware

Converged vs. Hyper-Converged: What Does Your Data Center Need?
sponsored by HPE and Intel® Corporate
EGUIDE: The goal of converged architecture is to alleviate pressure on overworked data centers, but it all goes to waste if you don't have the right system to compliment your existing IT investments. This e-guide covers the basics of converged and hyper-converged architectures, with pros, cons, and hypervisor flexibility detailed. Download to learn more.
Posted: 24 May 2017 | Published: 24 May 2017

HPE and Intel® Corporate

Security Insights Magazine: 3 Accelerating Cybersecurity Trends
sponsored by DynTek
RESOURCE: In this resource, Intel's VP and CTO, Brett Kelsey, gives an in-depth interview on today's must-know cybersecurity trends. Additionally you'll learn how to forge a risk-based security strategy and where you cybersecurity gaps are.
Posted: 03 Apr 2017 | Published: 30 Dec 2016

DynTek

A Security Leaders Definitive Guide to the Threat Landscape
sponsored by Fortinet, Inc.
WHITE PAPER: This guide goes in-depth on five network trends that are causing security pros to panic, so you can begin to understand what your security infrastructure is up against and how to best prepare for it.
Posted: 02 May 2017 | Published: 30 Jan 2017

Fortinet, Inc.

Array Networks Secure Access Gateway Datasheet (SSL VPN)
sponsored by Array Networks
RESOURCE: In this resource, learn about Array Network's AG Series secure access gateways and see how they match up against the competition.
Posted: 12 Apr 2017 | Published: 31 Mar 2017

Array Networks

Case Study: Tesco's £65 million data centre strategy to drive online growth
sponsored by ComputerWeekly.com
CASE STUDY: This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

ComputerWeekly.com

Network Security Trends: Understanding the State of Network Security Today
sponsored by Gigamon
RESEARCH CONTENT: Gigamon commissioned the Enterprise Strategy Group (ESG) to conduct a survey of 300 IT and cybersecurity professionals to evaluate the challenges, changes, best practices, and solution requirements for network security operations and network security tools. Get access to this survey report for key insights into the state of network security today.
Posted: 09 Jun 2017 | Published: 31 Jan 2017

Gigamon

Tips to an Easier Hybrid Cloud Deployment
sponsored by Zadara Storage
EGUIDE: Discover how to avoid making the wrong choices, understand what to look for, reduce time to provisioning when deploying a hybrid cloud environment.
Posted: 14 Apr 2017 | Published: 10 Apr 2017

Zadara Storage

Converged Infrastructure: Comprehensive Resource Center
sponsored by Dell EMC Intel®
RESOURCE CENTER: This custom website will serve as your essential resource library for converged infrastructure, with detailed articles specific workload functionality, and the evolving building blocks of converged IT. Click through to find exclusive resources, like 4 considerations for choosing CI for private clouds, and more.
Posted: 03 May 2017 | Published: 03 May 2017

Dell EMC Intel®

Agile Infrastructure and Storage for Healthcare IT
sponsored by Pure Storage
WHITE PAPER: This white paper explores how healthcare IT teams can architect more agile infrastructures that can keep pace with the velocity of care.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Pure Storage

Automation Isn't One-Size-Fits-All
sponsored by FireMon
WHITE PAPER: In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.
Posted: 13 Apr 2017 | Published: 30 Dec 2016

FireMon

The IoT Explosion's Impact on Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: Find out what's driving the IoT explosion and how you can prepare your network for the potential security risks that accompany it.
Posted: 03 May 2017 | Published: 09 Feb 2017

Fortinet, Inc.

Hybrid Flash: The Essential guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide offers a comprehensive survey of the hybrid flash storage market. We give the lowdown on hybrid flash products from the big six storage vendors and the startups and specialists. Plus, we take a look at what's best for virtual desktops: All-flash or hybrid?
Posted: 10 Oct 2016 | Published: 10 Oct 2016

ComputerWeekly.com

The Business Value of NVMe
sponsored by Tegile
WHITE PAPER: Download this resource to closely examine the definition and business value of NVMe, with details on scaling with NVMe/F, implementation use cases like VDI, ERP systems, and Microsoft SQL Server illustrated, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Tegile

Universal Storage for Data Lakes: An ESG Evaluation
sponsored by Dell EMC and Intel®
WHITE PAPER: This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.
Posted: 06 Jun 2017 | Published: 30 Nov 2017

Dell EMC and Intel®

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Rethinking the Approach to Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: Before an effective network security strategy can be put in place, you need to understand the top cybersecurity challenges putting organizations at risk today. Learn more about these challenges, including cloud adoption, IoT and ransomware.
Posted: 04 May 2017 | Published: 10 Feb 2017

Fortinet, Inc.

Data Exfiltration and DNS – Closing Back-Door Access to Your Sensitive Data
sponsored by Infoblox
WHITE PAPER: DNS is increasingly being used as a pathway for data exfiltration either by malware-infected devices or by malicious insiders. This paper lays out the tactics hackers use to exploit DNS for purposes of DNS tunneling and data exfiltration.
Posted: 31 May 2017 | Published: 31 May 2016

Infoblox
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement