Vertical Industries  >   Consumer Packaged Goods Industry  >  

Information Appliances Industry

RSS Feed    Add to Google    Add to My Yahoo!
Information Appliances Industry Reports
IBV Study: Capitalizing on the Power of the Smarter Consumer
sponsored by IBM
WHITE PAPER: Business survival in the age of the smart consumer means empowering your customers to shop how and when they want. In this white paper, find the results of a recent survey of more than 30,000 consumers and uncover the key trends shaping the world of retail.
Posted: 07 May 2013 | Published: 28 Feb 2011


Computer Weekly - 10 January 2012: What’s in store for IT this year?
sponsored by
EZINE: In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.
Posted: 14 Sep 2012 | Published: 10 Jan 2012

Not Business as Usual. The Changing Channels in Consumer Electronics
sponsored by IBM Line of Business
WHITE PAPER: IBM explores how the impact of innovative business models for "how to sell" are now as important as the innovative products themselves - CE manufacturers need to skillfully manage their mix of sales channels for future success.
Posted: 29 Nov 2007 | Published: 01 Nov 2007

IBM Line of Business

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010


Paramount Foods Upgrades Store Technology
sponsored by Hewlett-Packard Company
CASE STUDY: Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.
Posted: 18 Mar 2008 | Published: 01 Oct 2006

Hewlett-Packard Company

Graphic Packaging International Achieving Operational Excellence
sponsored by SAP America, Inc.
CASE STUDY: In this case study, Graphic Packaging International Inc (GPI) needed a single end-to-end solution across the enterprise after their acquisition of Riverwood Holding Inc. Learn how SAP ERP application was their solution.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010


Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

CW Special report on Wipro
sponsored by
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

IT Priorities 2014: UK Europe, France and Germany
sponsored by
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software

Computer Weekly Special Report: Fujitsu
sponsored by
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Network Access Control: Navigating the Crowded Market
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

Special report on EMC
sponsored by
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Case Study: Tesco's £65 million data centre strategy to drive online growth
sponsored by
CASE STUDY: This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Special Report on Cisco
sponsored by
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

SSD: Features, Functions and FAQ
sponsored by
EGUIDE: This expert E-Guide explores key considerations for integrating solid state storage into a server, and answers frequently asked questions about solid state. Read now to learn more.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

Gain the Competitive Edge with Streamlined Big Data Analytics
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform across diverse industries, from healthcare and retail to telecommunications, highlighting common data processing use cases and exploring examples of specific use cases. Read on to find out more.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Dell, Inc. and Intel®

CW Special Report on IBM
sponsored by
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

WAN Optimization Case Study: A Snapshot of LDF Food Group, Inc
sponsored by Earthlink.
CASE STUDY: This case study examines how LDF Food Group was able to increase their bandwidth, reduce costs and improve network reliability, efficiency and security by optimizing its network. Read on here to optimize your organization's wide area network (WAN) like LDF, and adapt to, and excel with, increasing business demands.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


CW Special Report on HP
sponsored by
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Healthcare Analytics Performance Report by Top Researchers
sponsored by Information Builders
WHITE PAPER: Access this voluminous white paper to find out why analytics are reverberating throughout the healthcare industry. Review the performance of BI vendors, and highlight those who contribute the most value.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

WAN Speak Musings – Volume I
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Windows Server 2012 Security from End to Edge and Beyond
sponsored by
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

Preparing for the Next Attack: Evaluate Your Network Security with Incident Response
sponsored by FireEye
WHITE PAPER: This guide will help you evolve your ability to respond to critical security incidents. Access this paper to uncover the 6 core capabilities to keep in mind as you plan and maintain your network security response plan.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Antimalware IT Checklist: Decision Time Part 3
sponsored by
EGUIDE: This is the third piece in's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Enterprise antimalware excess? Managing antimalware security products
sponsored by
EGUIDE: Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

Information Security Breaches Survey 2013
sponsored by
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement