IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN White Papers (View All Report Types)
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Gartner Critical Capabilities for SIEM
sponsored by Intel Security
WHITE PAPER: As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Posted: 23 Oct 2015 | Published: 25 Jun 2014

Intel Security

The Forrester Wave™: DDoS Services Providers, Q3 2015
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 09 Feb 2016 | Published: 22 Jul 2015

Imperva

The Threat Landscape of 2015
sponsored by Forcepoint
WHITE PAPER: This report examines new technological trends and discusses what these trends mean for your security.
Posted: 19 Jan 2016 | Published: 14 Sep 2015

Forcepoint

The Power and Payback of Unified IT Monitoring
sponsored by CA Technologies
WHITE PAPER: In this white paper, you will discover the organizational and strategic impacts of unified IT monitoring for your enterprise and management service providers. Access this paper to examine its business value, which includes improved visibility, coverage, readiness, and tooling costs.
Posted: 13 Jan 2016 | Published: 30 Jun 2014

CA Technologies

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

SIEMplifying Security Monitoring for SMBs
sponsored by AlienVault
WHITE PAPER: This white paper discusses the unique SIEM challenges SMBs face. Access this resource now to learn how you can get the most out of your SIEM despite limited resources.
Posted: 22 Oct 2015 | Published: 22 Oct 2015

AlienVault

Cost-Benefit Analysis: Comparing Key Players for Structured Analytics
sponsored by IBM
WHITE PAPER: Can your organization implement Hadoop clusters without being crippled by IT costs? This resource considers two major players offering structured analytics. Access now to see each of their cost-benefit results and discover the best choice for your business.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement