IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTINReports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Turn Data into Knowledge
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover one solution that collects user-generated data and transforms it into a self-service help desk. By engaging users to have conversations on a platform as easy and intuitive as Facebook or Twitter, your IT organization mines data to create a self-help portal.
Posted: 26 Nov 2014 | Published: 18 Jun 2014

Hewlett-Packard Company

DDoS and Downtime Considerations for Risk Management
sponsored by Verisign, Inc.
WHITE PAPER: This exclusive whitepaper explores your risk management options when it comes to distributed denial of service attacks.
Posted: 27 Oct 2014 | Published: 11 Oct 2012

Verisign, Inc.

Keep Cyber Threats From Destroying Your Organization
sponsored by LabTech Software
EBOOK: This exclusive white paper examines future security risks to the network and provides and in-depth look at how to combat them.  Read on to learn how you can ease that burden for your IT department.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

LabTech Software

Beyond Shadow IT: A Proactive Approach to Reducing Risk While Embracing Cloud Services
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper will teach you how to address shadow IT to ensure a stable, secure cloud environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

SkyHigh

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: This exclusive whitepaper offers up 10 tips for improving your incident response capabilities.
Posted: 14 Nov 2014 | Published: 14 Nov 2013

Dell SecureWorks

Minimize Check Fraud and Counterfeited Print
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a solution developed by HP and TROY to control check printing operations and help prevent fraud on finished checks, adding security to a variety of applications.
Posted: 10 Nov 2014 | Published: 31 Mar 2014

Hewlett-Packard Limited

Akamai's (State of the Internet) / Security
sponsored by Akamai Technologies
WHITE PAPER: The following white paper explores the explosion of DDoS attacks that took place Q3 2014 and examines the various methods used, potential ways to thwart future attacks, and much more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement