IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Dedicated Short Range Communication

RSS Feed    Add to Google    Add to My Yahoo!
Dedicated Short Range Communication Reports
 
Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TOPICS:  RFID | Security
ComputerWeekly.com

Using Technologies to Increase Perfect Order Metrics
sponsored by Intermec
WHITE PAPER: Companies are continually finding new ways to get the right goods to the right customers on time. This white paper explains how each aspect of perfect order performance can be improved through enhancements to data collection processes and technologies.
Posted: 13 Aug 2008 | Published: 13 Aug 2008

Intermec

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Supply Chain Management Strategies
sponsored by Aptean
EGUIDE: In this e-guide from the experts at SearchManufacturingERP.com, uncover essential strategies for creating an effective supply chain plan and learn how to drive supply chain management (SCM) success.
Posted: 12 Sep 2013 | Published: 12 Sep 2013

Aptean

How RFID Technology Can Enhance Your Asset Management Program
sponsored by Infor
WHITE PAPER: With today's RFID technology, more data can be gathered faster and less expensively than ever before. Read this white paper and learn how RFID can help you gain significant time savings and enable better asset management.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Infor

Zebra. We Tag It - E-Book
sponsored by Zebra Technologies
EBOOK: When you tag it, you can see it, measure it, and learn from it. Tagging gives visibility into business to make the right decisions, at the right time, with the right information. Zebra can tag it with everything from bar codes to badges to RFID. Get the right information to do it better. All you have to do is tag it.
Posted: 18 Apr 2011 | Published: 18 Apr 2011

Zebra Technologies

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management
sponsored by Intermec
WHITE PAPER: This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects
sponsored by Intermec
WHITE PAPER: This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Building a Unified Enterprise Mobility Strategy
sponsored by Motorola, Inc.
WHITE PAPER: This paper outlines a step-by-step approach to developing a unified enterprise mobility strategy, enabling a more cost-effective and efficient delivery of network connectivity to a larger mobile workforce.
Posted: 29 Jun 2007 | Published: 01 May 2007

Motorola, Inc.

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement