IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automated Data Collection

RSS Feed    Add to Google    Add to My Yahoo!
Automated Data CollectionReports
 
How Document Process Automation Helps SAPĀ® Customers Improve Profitability
sponsored by Esker Inc.
WHITE PAPER: Written primarily for CEOs, CFOs, CIOs and managers, this paper is designed to help businesses effectively reduce the costs of document management and gain immediate additional value from their investments in SAP solutions.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Esker Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Everything you need to know about successful AIDC
sponsored by SearchManufacturingERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchManufacturingERP

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Data Collection and Process Automation in an SAP Environment: The Next Generation
sponsored by Acsis, Inc.
WHITE PAPER: Learn how to address shop floor automation challenges and device integration to deliver more value within a SAP environment. Learn how to facilitate plant device and mobile user automation that works with SAP's Enterprise Service Architecture.
Posted: 16 Oct 2006 | Published: 01 Sep 2006

Acsis, Inc.

Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
sponsored by ADT
EGUIDE: This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

ADT

Manufacturing IT Best Practices: Supply Chain Management
sponsored by SearchManufacturingERP
EBOOK: As supply chains extend across the globe and their complexity increases, manufacturers are learning that the right software can be a key component of successful supply chain planning and execution. Read this expert e-book to find tips and best practices for supply chain management (SCM).
Posted: 30 Mar 2012 | Published: 29 Mar 2012

SearchManufacturingERP

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement