IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Read on to examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. You'll discover a maturity path for managing mobile devices in a SAM context, and more inside.
Posted: 12 Oct 2017 | Published: 31 Dec 2016

Snow Software

How to Meet the Growing Demands and Challenges of IT
sponsored by Rackspace
RESOURCE: This infographic offers a clear perspective on four factors to consider when outsourcing your IT. Download now to meet your business demands with a broker model that will reduce shadow IT through self-serve provisioning, and 3 more.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Rackspace

Digital Workspace Basics E-book
sponsored by VMware
EBOOK: In this e-book, you'll discover the keys to successfully managing digital workspaces. Read on to see instruction for enhancing data loss prevention by reducing your attack surface, creating an intuitively simple user experience across all devices, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

VMware

Enterprise Cloud Solutions for Hyper-converged
sponsored by Nutanix
EBOOK: This pocket e-book serves as your guide to a hyper-converged infrastructure (HCI) that not only supports VDI and tier 2 apps, but on which you can also simultaneously run critical databases, eliminate infrastructure silos for unified communications apps, and more. Read on to gain a detailed overview.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Nutanix

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

4 Compelling Use Cases for Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: In this paper, discover four concrete use cases for v-SAN-powered hyper-converged infrastructure, with each case deconstructed. Read on to see how HCI is evolving traditionally restrictive hardware-centric environments for success with remote/branch office deployment, VDI/EUC, and 2 more.
Posted: 26 Sep 2017 | Published: 31 Jan 2017

VMware & Intel

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement