IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

EPC

RSS Feed    Add to Google    Add to My Yahoo!
EPC Reports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

IDC Case Study: Flying High on the Use of Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This white paper explains how UK-based organization Flybe, Europe's largest regional airline, was able to leverage Linux to revolutionize their IT support capabilities, creating new opportunities for innovation and revenue streams.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Red Hat

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Big data analysis: The essential next step for security
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper explains how you can use big data analysis to stop even the most sophisticated attacks.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Logistics Company Leverages 3 ITSM Tools to Increase Process Speeds
sponsored by Matrix42
CASE STUDY: Access this case study to see how a leading logistics service provider leveraged 3 IT service management (ITSM) tools in a single portal without interrupting its mission-critical IT services during the integration.
Posted: 10 Jul 2015 | Published: 31 Dec 2013

Matrix42

Infographic: Windows vs RHEL TCO
sponsored by Red Hat
RESOURCE: The following infographic demonstrates the top 5 statistics why enterprises go with Linux when they need greater performance from their IT environment. Access now to learn more.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Red Hat

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
EPC White Papers | EPC Multimedia | EPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement