IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automated Data Collection

RSS Feed    Add to Google    Add to My Yahoo!
Automated Data Collection White Papers (View All Report Types)
 
Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Data Collection and Process Automation in an SAP Environment: The Next Generation
sponsored by Acsis, Inc.
WHITE PAPER: Learn how to address shop floor automation challenges and device integration to deliver more value within a SAP environment. Learn how to facilitate plant device and mobile user automation that works with SAP's Enterprise Service Architecture.
Posted: 16 Oct 2006 | Published: 01 Sep 2006

Acsis, Inc.

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

How Document Process Automation Helps SAPĀ® Customers Improve Profitability
sponsored by Esker Inc.
WHITE PAPER: Written primarily for CEOs, CFOs, CIOs and managers, this paper is designed to help businesses effectively reduce the costs of document management and gain immediate additional value from their investments in SAP solutions.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Esker Inc.

Cost Justification of an Automated Data Collection System
sponsored by Epicor Software Corporation
WHITE PAPER: Learn how automated data collection can help you increase ROI, achieve better information, reduce shipping errors, increase customer satisfaction and improve ef-ficiency of manufacturing operations.
Posted: 21 Feb 2008 | Published: 01 Jun 2004

Epicor Software Corporation

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

How Mobile Printers Drive Efficiency Throughout the Supply Chain
sponsored by Zebra Technologies
WHITE PAPER: This paper discusses how supplementing enterprise-printing operations with mobile printers eliminates bottlenecks and boosts accuracy, resulting in better overall performance of manufacturing, warehouse management, and supply chain operations.
Posted: 26 Feb 2010 | Published: 26 Feb 2010

Zebra Technologies

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement