Inventory Control Management Reports

How to Get Lean with Automated Process Discovery - Live demonstration and case study presentation
sponsored by Fujitsu America, Inc.
WEBCAST: The biggest challenge to improving the efficiency of your business processes often lies in knowing how these processes really work in your organization. This webcast will teach you how to visualize and analyze your business processes from historical data, expose process waste and apply lean initiatives to achieve significant value.
Posted: 23 Mar 2010 | Premiered: Mar 23, 2010

Fujitsu America, Inc.

Do More with Less: The Five Strategies used by Successful SMB Manufacturers
sponsored by Infor
WHITE PAPER: A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs.
Posted: 10 Aug 2009 | Published: 04 Sep 2008

Infor

Expert Tips: Ten Essentials for Migrating Enterprise Desktops to Windows 7
sponsored by TechTarget Data Center
EGUIDE: Enterprise desktop migration involves the full re-engineering of desktops, laptops and all related management systems across a company. Access this expert e-guide from SearchEntepriseDesktop.com to discover the 10 essential steps to simplify desktop migrations to Windows 7.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

TechTarget Data Center

How Distributors Can Streamline Supply Chain Management
sponsored by Junction Solutions
WHITE PAPER: Access this resource to learn how to optimize your entire value chain for increased cost control, streamlined supply chain processes, and more effective customer service.
Posted: 16 Sep 2013 | Published: 31 Dec 2011

Junction Solutions

About to Buy: Mobile Device Management Software
sponsored by GroupLogic
EBOOK: Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software.
Posted: 05 Apr 2012 | Published: 30 Mar 2012

GroupLogic

What Supply Chain Hurdles Most Worry Discrete Manufacturers?
sponsored by Oracle Corporation
EGUIDE: Discrete manufacturers—as diverse as this category can be—have shared challenges. In this expert e-guide, learn about 4 of the most common supply chain management challenges faced by these manufacturers, and what can be done to help overcome them.
Posted: 31 Aug 2016 | Published: 30 Aug 2016

Oracle Corporation

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Handling Demand Volatility: Creating Integrated Demand-Supply Networks
sponsored by E2open
PRESENTATION TRANSCRIPT: This presentation transcript gives advice on handling demand volatility, with creating an integrated demand-supply network being the key. You'll read details on the evolution of supply chains demand-supply networks and gather information on overcoming issues that can challenge your demand-supply network implementation.
Posted: 07 Apr 2009 | Published: 16 Mar 2009

E2open

SEEBURGER Technology Proves Profitable for SEGA
sponsored by SEEBURGER
CASE STUDY: SEEBURGER's B2B Gateway handles business integration for SEGA, due to which SEGA has reduced time to load orders less than 4 minutes, reduced administrative personnel training from three months to three weeks.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity