Hardware  >   Peripheral Hardware  >   User Input Devices  >  

Barcode Scanners

RSS Feed    Add to Google    Add to My Yahoo!
Barcode Scanners Reports
Guide to Scanning Technologies
sponsored by Intermec
WHITE PAPER: Intermec is uniquely positioned to guide you through technical information and different scanning applications so you will be able to make informed choices about what will work best for you.
Posted: 09 Mar 2007 | Published: 01 Dec 2003


Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010


Zebra. We Tag It - E-Book
sponsored by Zebra Technologies
EBOOK: When you tag it, you can see it, measure it, and learn from it. Tagging gives visibility into business to make the right decisions, at the right time, with the right information. Zebra can tag it with everything from bar codes to badges to RFID. Get the right information to do it better. All you have to do is tag it.
Posted: 18 Apr 2011 | Published: 18 Apr 2011

Zebra Technologies

UNIX to Linux Migration Assessment
sponsored by Red Hat
RESOURCE: Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures.
Posted: 02 Apr 2014 | Published: 31 Dec 2010

Red Hat

Enhance Security with Hardware Based Memory Protection
sponsored by Oracle Corporation
VIDEO: This video discusses a hardware based memory protection system that improves security and reliability and can fit a multitude of different data center designs. Watch now to learn how this memory protection can improve your data center security, reliability, and efficiency.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Big Data and the 3 "V's": What To Consider When Scaling Your Big Data
sponsored by Rackspace
RESOURCE: Find out how Hadoop can be used to accommodate the scaling needs of big data.
Posted: 02 Oct 2014 | Published: 29 Aug 2013


Allocate virtual desktop hardware resources with proper benchmarking
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert e-guide, learn why accounting for demand spikes is so crucial before moving desktops to a virtual environment and discover three ways to ensure sufficient virtual desktop hardware resources.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Dell, Inc. and Intel®

Modern Infrastructure ANZ April 2015
sponsored by SearchDataCenter.com
EZINE: BYOD in ANZ: Benefits, challenges and IT headaches Employees are demanding – and businesses are enabling – the use of personal computing devices in the workplace
Posted: 06 Apr 2015 | Published: 24 Mar 2015


High-performance Two-socket Server Supports a Variety of Business-Critical Workloads
sponsored by IBM and Intel.
DATA SHEET: Read this informative data sheet from IBM detailing their new server hardware optimized for cloud computing and desktop virtualization and learn how their new servers can cut downtime out of the equation for you and your organization.
Posted: 07 Jul 2014 | Published: 30 Sep 2013

IBM and Intel.
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement