Standards  >   Network Protocols  >   OSI Protocols  >  

Manufacturing Applications Protocol

RSS Feed   
Manufacturing Applications Protocol Reports
 
Six reasons why manufacturers should consider cloud ERP
sponsored by ComputerWeekly.com
ANALYST REPORT: There are a number of benefits beyond total cost of ownership when manufacturing companies deploy cloud ERP, this research from Analyst Group Nucleus reveals.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

The Path to a Thinking Supply Chain
sponsored by IBM
RESEARCH CONTENT: In this research report from IDC, explore how digital transformation is changing what we know about the modern supply chain. Learn about the key technology trends shaping supply chain transformation, and review your technology options with IBM.
Posted: 24 May 2019 | Published: 31 Aug 2018

IBM

Are Your Communications At Risk?
sponsored by Verizon
WHITE PAPER: Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

Secure SD-WAN Without Compromise
sponsored by Silver Peak
WHITE PAPER: In this white paper, learn how Silver Peak's SD-WAN and Zscaler's Internet Access work together to deliver a secure SD-WAN that protects enterprises from threats, optimizes application performance and delivers flexible connectivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Silver Peak

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Key Considerations for MPLS IP-VPN Success
sponsored by XO Communications
WHITE PAPER: Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement