IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

EPC

RSS Feed    Add to Google    Add to My Yahoo!
EPC Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

How Digital Transformation Is Changing the Role of the Data Center
sponsored by Dimension Data
VIDEO: In this exclusive webcast, Editor-in-Chief at Computer Weekly Brian Glick demonstrates how digital transformation is significantly affecting the role of the enterprise data center. Tune in to ensure competitive longevity by modernizing your data center architectures with cloud-enabled, scalable deployments.
Posted: 18 Mar 2016 | Premiered: 18 Mar 2016

Dimension Data

How to Bring a Common Language to Your IT Systems
sponsored by BDNA
WHITE PAPER: This white paper provides best practices for managing your IT assets. Learn how normalizing data, enriching data, and categorizing assets can help take the pain out of IT system management.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

The Platform Explosion: Harness It or Lose IT Agility
sponsored by Box
ANALYST REPORT: This Forrester report will assist your enterprise architect (EA) in navigating the mushrooming software platform market to create a portfolio plan, which seizes the opportunity platforms present without killing responsiveness. Access this exclusive report to and view a 4-step roadmap to strategic software platform implementation.
Posted: 20 Apr 2016 | Published: 30 Mar 2016

Box

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security

The Essential CIO's Guide to Data Center Outsourcing
sponsored by Windsor Group
WHITE PAPER: Dive into this exclusive CIO's guide to discover how to transform your IT operations by way of data center outsourcing. Learn how you can gain better efficiency, service, and disaster preparedness, as well as see why a quantifiable impact analysis is the first critical step to your IT transformation.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

Windsor Group

AIIM Report: Paper-Free Progress and Measuring Outcomes
sponsored by EMC
ANALYST REPORT: This exclusive report takes an in-depth look at the challenges of digitizing paper processes, digital mailrooms and multi-channel capture, and learn how to go paper-free and transform your business processes with mobile and cloud.
Posted: 05 Apr 2016 | Published: 31 Dec 2015

EMC

What to Look for in Multifactor Authentication Tools
sponsored by SearchSecurity.com
EBOOK: In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.
Posted: 21 Mar 2016 | Published: 05 Jan 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
EPC White Papers | EPC Multimedia | EPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement