IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Dramatically Improve Service Availability
sponsored by ServiceNow
EBOOK: By developing a service availability strategy, you can address IT issues before they become business problems. This ebook can help you identify where availability challenges exist and improve your ability to analyze, prevent, and address problems before they occur with IT Operations Management.
Posted: 07 Aug 2017 | Published: 31 Aug 2016

ServiceNow

Security Analysis Principles and Techniques for IT Pros
sponsored by SearchSecurity.com
EBOOK: As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

SearchSecurity.com

How to Mitigate IP Theft by Departing Employees
sponsored by Veriato, Inc.
WHITE PAPER: The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Veriato, Inc.

HCI Can Pave the Way to a Software-defined Platform and the SDDC
sponsored by Hewlett Packard Enterprise
EGUIDE: Before purchasing and implementing a complete SDDC, download this guide to determine how much of a software-defined platform your business needs. You'll discover the role of HCI in SDDCs, and learn how build an SDDC by using HCI's software-defined platform as foundation for version-controlled node automation, and more.
Posted: 21 Aug 2017 | Published: 16 Aug 2017

Hewlett Packard Enterprise

HPE-SimpliVity Deal Raises Support, Price and Development Questions
sponsored by Hewlett Packard Enterprise
EGUIDE: What's to be expected from HPE's purchase of SimpliVity? Download this guide by searchConvergedInfrastructure.com editors, as SimpliVity customers react to the move. The info inside will help you keep an eye on HPE's support of SimpliVity products, how and if SimpliVity becomes part of HPE's multicloud strategy, and more.
Posted: 21 Aug 2017 | Published: 15 Aug 2017

Hewlett Packard Enterprise

Should Your Enterprise Deploy a Software-Defined Data Center?
sponsored by Lenovo and Intel
ANALYST REPORT: Is a software-defined data center suitable for your enterprise? In this report, two IT analysts will help you answer this very question, outlining implementation recommendations. Read on to also learn which projects gain the most value from an SDDC, 5 pillars of the SDDC business case, and more.
Posted: 21 Jul 2017 | Published: 27 Apr 2017

Lenovo and Intel

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement