Vendor Managed Inventory Reports

Cisco, IBM and Rockwell Automation: Integrated Manufacturing Productivity for Automotive
sponsored by IBM Line of Business
PRODUCT LITERATURE: Learn how this comprehensive solution could enhance not only your manufacturing productivity, but quality and cost control as well.
Posted: 03 Mar 2008 | Published: 01 Aug 2007

IBM Line of Business

About to Buy Guide: Mobile Device Management Software
sponsored by TechTarget Security
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

TechTarget Security

Expert Tips: Ten Essentials for Migrating Enterprise Desktops to Windows 7
sponsored by TechTarget Data Center
EGUIDE: Enterprise desktop migration involves the full re-engineering of desktops, laptops and all related management systems across a company. Access this expert e-guide from SearchEntepriseDesktop.com to discover the 10 essential steps to simplify desktop migrations to Windows 7.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

TechTarget Data Center

Thomas & King Case Study: The Right Ingredients for Software Asset Management
sponsored by Dell, Inc. and Intel®
CASE STUDY: Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management.
Posted: 07 Oct 2009 | Published: 01 Oct 2008

Dell, Inc. and Intel®

Breaking the Supply Chain Barrier: Dynamic Demand-Supply Networks for Today's Virtual Enterprises
sponsored by E2open
WHITE PAPER: Few business objectives have been so ill-served as the notion of equilibrium between demand and supply. This report is intended as a "call to arms" for companies currently managing their supply chains as though they were still horizontally-integrated, linear systems.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

E2open

Transforming to a Flexible and Lean Demand-Supply Network
sponsored by E2open
CASE STUDY: LSI, a provider of silicon, systems, and software technologies that power solutions in the storage, networking, and mobility markets, had simple business objectives: improve customer service and product quality while cutting down on costs. LSI implemented E2open's multi-enterprise solution, increasing overall business intelligence, control..
Posted: 06 Mar 2009 | Published: 06 Mar 2009

E2open

Leadership Makes the Difference during Times of Global Financial Crisis: Optimizing Business Cycles through Technology Investment
sponsored by SAP America, Inc.
WHITE PAPER: Investing in the right IT platform and end-to-end business processes enables companies to simplify the IT landscape and reduce total it cost.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

10 Secret Strategies to Recession-Proof Your Business
sponsored by Coupa
WHITE PAPER: When the economy is moving forward, most executives focus on growing sales. But when the economy slows down, that focus shifts. This timely white paper explains 10 Secret Strategies to Recession-Proof Your Business.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Coupa

CW Buyer's Guide: E-Commerce Experience Management, Security, and More
sponsored by TechTarget ComputerWeekly.com
EBOOK: Computer Weekly has explored ways to deliver a dynamic, secure, and even compliant omni-channel experience. Discover how tokenization is shaking things up in transaction data, and what you can do to access and protect customer information in the face of Payment Card Industry Security Standards.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

TechTarget ComputerWeekly.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security