Inventory Control Management Reports

SOA Blueprint for Supply Chain Visibility
sponsored by IBM Software Group
WHITE PAPER: This white paper details how improved supply chain visibility can be attained through use of an SOA.
Posted: 27 Nov 2007 | Published: 01 Aug 2007

IBM Software Group

How Distributors Can Streamline Supply Chain Management
sponsored by Junction Solutions
WHITE PAPER: Access this resource to learn how to optimize your entire value chain for increased cost control, streamlined supply chain processes, and more effective customer service.
Posted: 16 Sep 2013 | Published: 31 Dec 2011

Junction Solutions

Case Study: Peet's Coffee & Tea Sets Direction for Growth with Outstanding Quality
sponsored by Junction Solutions
CASE STUDY: In this case study, discover how Peet's Coffee & Tea leveraged a unified business management technology to overcome the challenges of a legacy business management system.
Posted: 16 Sep 2013 | Published: 31 Dec 2010

Junction Solutions

SAP Global Available-To-Promise Check rapid-deployment solution
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Your customers want access to timely information, and you need to confirm and process orders quickly and efficiently. What if you could do both - while also increasing customer satisfaction? Access this white paper to find out how that's possible using SAP Global Available-to-Promise check rapid-deployment technology.
Posted: 25 Sep 2013 | Published: 31 May 2013

Hewlett Packard Enterprise

SYSPRO ERP Enables UPI to Punch Above its Weight
sponsored by Syspro
CASE STUDY: Access this brief case study today to learn how the right tools and services enabled healthcare products manufacturer United Pacific Industries (UPI) to effectively manage and track stocks and costs, optimize its inventory, and more.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Syspro

Tip Guide: Supply chain analytics offers cost, revenue advantages
sponsored by SAP America, Inc.
EGUIDE: Propelled by globalization and the convergence of mobile and cloud computing, industry experts believe that although supply chain analytics has been around for a decade, it is truly on the verge of taking off. In this tip guide, readers will discover the advantages of advanced manufacturing business intelligence (BI).
Posted: 07 Nov 2011 | Published: 07 Nov 2011

SAP America, Inc.

Case Study: Grocery Chain Gains Productivity and Information Visibility for Better Inventory Control
sponsored by Junction Solutions
CASE STUDY: In this resource, discover how a major grocery store chain replaced an outdated, unsupported technology infrastructure with a new ERP system in order to make reporting easier, and streamline and automate business processes.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

Junction Solutions

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility
sponsored by Motorola RFID Solutions
WHITE PAPER: Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.
Posted: 23 Feb 2010 | Published: 30 Nov 2007

Motorola RFID Solutions

Maximizing the Power of Your Desktop Database: Top business advantages of moving your data online
sponsored by Intuit QuickBase
WHITE PAPER: Many organizations that rely on desktop solutions to house data are frustrated with their lack of flexibility and scalability. This paper shows how online databases are an alternative to desktop products, combining speed and ease of use with the collaborative functions required to power organizations' unique business processes and performance.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

Intuit QuickBase

About to Buy Guide: Mobile Device Management Software
sponsored by TechTarget Security
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

TechTarget Security