Supply Chain Logistics Reports

The CISO's guide to supply chain security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly - 26 October 2021: Managing cyber risk by integrating supply chains
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our new Buyer's Guide examines the security and IT integration challenges of modern supply chains – we also talk to the CEO of SolarWinds about how the company overcame its huge supply chain attack. And we look at how a small town in Lancashire was chosen to host the UK's National Cyber Force. Read the issue now.
Posted: 22 Oct 2021 | Published: 26 Oct 2021

TechTarget ComputerWeekly.com

B2B Collaboration: No Longer Optional
sponsored by IBM
WHITE PAPER: In this report from the Aberdeen Group, get an in-depth look at why B2B collaboration is such a priority, as well as what actions business leaders are taking, the challenges they face, and their plans to execute B2B collaboration strategies.
Posted: 25 Jun 2014 | Published: 31 May 2012

IBM

Data Quality Management
sponsored by OpenText GXS
WHITE PAPER: Find out how data quality can lead to a well-oiled supply chain and successful transportation and logistics projects.
Posted: 16 Jun 2014 | Published: 31 Jul 2013

OpenText GXS

Aberdeen Group: Today's Customer Data-Driven Supply Chain: Top Five Practices
sponsored by IBM
EBOOK: In this informative e-book, you will learn about the impact of using customer data on key supply chain metrics. Access this paper today to get the analyst perspective on thorough research and insights regarding the connection between customer profile data and companies' supply chains.
Posted: 10 Sep 2013 | Published: 30 Apr 2013

IBM

Protecting Mission-Critical Manufacturing Data with an ERP Firewall
sponsored by OpenText GXS
WHITE PAPER: Find how an ERP Firewall can capture business process and data quality errors, so outsourcing data doesn't create mayhem within your company.
Posted: 02 Jun 2014 | Published: 31 Jul 2013

OpenText GXS

How to Navigate Today's Supply Chain Challenges
sponsored by Epicor Software Corporation
WHITE PAPER: Enterprise resource planning (ERP) systems are taking an increasingly prominent role in a variety of business activities. View this resource to find out more about how to modernize the user experience as mobile, analytics, social and the cloud.
Posted: 20 Jun 2013 | Published: 11 Jun 2013

Epicor Software Corporation

Practical tips for deploying sustainable supply chains
sponsored by IQMS
EGUIDE: In this e-guide, explore expert tips for developing an effective sustainability model for your supply chain, factors and obstacles you'll need to consider, and two case studies detailing the real-world challenges and successes of manufacturers identified as "leaders in sustainability" by the analyst firm IDC Manufacturing Insights.
Posted: 16 Jan 2013 | Published: 08 Jan 2013

IQMS

Solution Spotlight: Introduction to Supply Chain Management (SCM) EDI
sponsored by IBM and ComResource
EGUIDE: You know the business benefits of effective supply chain management (SCM) and electronic data interchange on their own, but what about the advantages of incorporating the two? This expert guide delves into the business value of SCM EDI including what to look for when evaluating a vendor or service provider.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

IBM and ComResource

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com