IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

UPC

RSS Feed    Add to Google    Add to My Yahoo!
UPC White Papers (View All Report Types)
 
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Debunking the Top Eight Myths Surrounding Small-Business Warehouse Management Systems (WMS)
sponsored by HighJump Software
WHITE PAPER: Learn why companies of all sizes are turning to best-of-breed warehouse management systems (WMS) in an effort to reduce costs and boost productivity in the face of increased globalization, regulation and competition.
Posted: 26 May 2008 | Published: 01 Aug 2007

HighJump Software

Cost Justification of an Automated Data Collection System
sponsored by Epicor Software Corporation
WHITE PAPER: Learn how automated data collection can help you increase ROI, achieve better information, reduce shipping errors, increase customer satisfaction and improve ef-ficiency of manufacturing operations.
Posted: 21 Feb 2008 | Published: 01 Jun 2004

Epicor Software Corporation

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

The Need for SOA to Achieve Flexibility and Agility within Plant Operations
sponsored by Apriso Corporation
WHITE PAPER: This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS).
Posted: 29 Aug 2008 | Published: 28 Aug 2008

Apriso Corporation

Using Technologies to Increase Perfect Order Metrics
sponsored by Intermec
WHITE PAPER: Companies are continually finding new ways to get the right goods to the right customers on time. This white paper explains how each aspect of perfect order performance can be improved through enhancements to data collection processes and technologies.
Posted: 13 Aug 2008 | Published: 13 Aug 2008

Intermec

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

The VMI Model: Managing Inventory outside the Four Walls
sponsored by Clear Spider Inc.
WHITE PAPER: Vendor Managed Inventory (VMI) is a business model that allows supplier/manufacturer organizations to access, control, and replenish inventory for their customers. Clear Spider is the industry leader in VMI technology.
Posted: 01 Sep 2008 | Published: 20 Aug 2008

Clear Spider Inc.

The Business Value of Red Hat CloudForms
sponsored by Red Hat
WHITE PAPER: This report highlights a vendor-agnostic platform for self-service provisioning and workload life-cycle management across hybrid multivendor virtualized, private cloud, public cloud, and container-based environments. Access now to deliver services and infrastructure resources with agility across the entire ecosystem, and more.
Posted: 30 Oct 2017 | Published: 30 Sep 2016

Red Hat

A Secure, IT-Approved File Sharing Alternative to Shadow IT
sponsored by Citrix
WHITE PAPER: Discover how to mitigate the security risks and Shadow IT issues associated with online file sharing services. Find out how to protect your data while still enabling employees to be productive, and uncover 5 ways to identify and eliminate Shadow IT that results from unauthorized file sharing accounts.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
UPC White Papers | UPC Multimedia | UPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement