chain

Results 401 - 425 of 750Sort Results By: Published Date | Title | Company Name
By: Larsen & Toubro Infotech(LTI)     Published Date: May 24, 2019
LTI leveraged S4HANA to deliver improved multi-vendor order allocations & competitive pricing in vendor bids helped drive cost efficiencies for the supply chain source function for a US-based hi-tech enterprise. Download full case study.
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
     Lenovo
By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
     Lenovo - APAC
By: Lenovo and Intel     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovo’s 360° approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : security, supply, chain, hardware, security
     Lenovo and Intel
By: Lenovo and Intel®     Published Date: Apr 28, 2017
Dive into this detailed case study to learn how Callaway Golf utilized SAP HANA with Lenovo to optimize their supply chain, get products to market faster, and maintain a competitive advantage. Get the case study now.
Tags : lenovo, lenovo and callaway golf, callaway golf, sap hana, lenovo sap hana, optimize supply chain, competitive advantage, market faster
     Lenovo and Intel®
By: LLamasoft     Published Date: Nov 12, 2018
This Economist Intelligence Unit report explores how sustainability considerations are spurring companies to think differently about managing supply chains.
Tags : llamasoft, supply chain, supply chain management, supplier sustainability, environmental safety
     LLamasoft
By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
     Looker
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
     Lumension
By: Madden Communications     Published Date: Sep 28, 2017
More sales. Cost efficiency. Higher profits. – Every marketer wants these, but over-emphasizing unit cost of POP materials over the total cost of production makes them miss out on chances to achieve them. Taking a Total Cost of Ownership (TCO) approach to supply chain management for brand activations enables marketers to grow their business more quickly and profitably. It entails, however, embracing new ways of thinking that can involve “unlearning” the status quo. This piece looks at factors comprising the three main categories contributing to Total Cost of Ownership: Direct Costs, Indirect Costs, and Post-Purchase Costs.
Tags : 
     Madden Communications
By: Makino     Published Date: Jun 23, 2017
Leadership at Chicago Faucets of Milwaukee, Wis., discusses how investments in flexible manufacturing systems helped drive company-wide supply chain improvements for improved delivery, inventory management and profitability in the manufacturing of its commercial faucets. Using two MMC2 flexible manufacturing cells with Makino horizontal machining centers, the company’s manufacturing team achieved the flexibility necessary to efficiently respond to real-time customer demand within an exceptionally high-mix production environment.
Tags : flexible manufacturing system, fms, machining automation, automated machining, machine tool automation, automated pallet handling, automated material handling
     Makino
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: Microsoft Dynamics     Published Date: Jul 09, 2007
Saddled with a home-grown business-management tool originally designed for its retail business, the Best Buy for Business sought a solution that would support its extensive outside sales force and would provide a commercial CRM solution it could sell to business customers. Best Buy for Business found both in Microsoft Dynamics CRM.
Tags : microsoft, microsoft dynamics, sales automation, salesforce automation, scm, supply chain management, crm, customer relationship management
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper outlines ways that technology can help manufacturers meet these challenges, increase operational efficiency, and step ahead of competitors with more proactive planning, greater shared visibility, and more agile and more profitable responses to change.
Tags : manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
The CPG manufacturing industry is large and thriving; however, margins are slim and competition is furious. There are hundreds of product categories, and to compete, firms must constantly innovate. How can the small-to-medium CPG manufacturer survive in the face of the same external pressures and fewer resources?
Tags : retailer, consumer goods, manufacturing, manufacturer, scm, supply chain, supply chain management, microsoft
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
By providing integrated, adaptable functionality within one scalable platform, Microsoft Dynamics AX helps midsize retailers improve their agility with an all-in-one solution based on an open technology platform. And it provides the ability for retailers to connect and interact with customers, partners, and employees around the world.
Tags : retailer, enterprise resource, erm, erp, financial, enterprise software, merchandising, accounting
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 11, 2007
This paper introduces various supply chain concepts and explains their importance. It describes initiatives being undertaken by the largest retailers and reviews what small and mid-size firms need to do to compete.
Tags : retailer, enterprise resource, erm, erp, sales software, sales management, scm, supply chain
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Sep 27, 2007
Demand planning software packages can help manufacturers to: establish baseline sales forecasts, incorporating multiple inputs; perform sophisticated analysis that improves their use of human and capital resources; optimize pricing capabilities; and better understand their markets and customers.
Tags : enterprise resource planning, erp, demand planning, planning, productivity, supply chain, scm, supply chain management
     Microsoft Dynamics
By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
     Mimecast
By: Mitel     Published Date: Dec 28, 2015
After years of being chained to the old ideas of office productivity, businesses are realizing that liberated employees are empowered employees. Download this whitepaper to liberate your organization's productivity by busting some of those old myths that may be holding your business back.
Tags : productivity, employee satisfaction, working remotely, 9-to-5 workday, mobile workforce, cloud computing, security, it management
     Mitel
By: Mitel     Published Date: Jun 29, 2016
After years of being chained to the old ideas of office productivity, businesses are realizing that liberated employees are empowered employees. When you free people from the tethers of the office, amazing things start to happen: productivity rises, borders and barriers disappear, innovation replaces enervation, and the quality of work improves as employees’ quality of life improves.
Tags : productivity, best practices, business intelligence, business management, information technology, solutions
     Mitel
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com