IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Sagicor Takes on Malware and Wins
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper tells the story of how one financial institution put a stop to their constant stream of malware attacks.
Posted: 08 May 2015 | Published: 08 May 2015


Holistic Protection against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: This white paper discusses how you can design security customized for your network and for fighting off potential targeted attacks.
Posted: 07 May 2015 | Published: 31 Oct 2014

Trend Micro

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


How to Achieve Complete Mobile Security without Sacrificing User Experience
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at dealing with the difficult security challenges associated with mobility adoption. Read on to learn more.
Posted: 22 Apr 2015 | Published: 18 Dec 2014

BlackBerry

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

The cost of IT downtime calculator
sponsored by Databarracks
RESOURCE: View this resource to learn how you can improve the standard of business continuity planning around individual systems, and why investing in disaster recovery technologies is critical to protect your business.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Databarracks

Securing Your Content Delivery Network
sponsored by Limelight Networks, Inc.
WHITE PAPER: In this brief white paper, you'll discover an in-network detection and attack mitigation solution that takes all the headaches out of content delivery network security.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement