IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  


RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Special Report: The Cost of Failed Trust
sponsored by Venafi
WHITE PAPER: This Ponemon report uses recent cybersecurity data to reveal why cryptographic keys and digital certificates are less trustworthy than many organizations believe.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Best Practices for the Next-Generation Data Centre
sponsored by Dimension Data
WHITE PAPER: This white paper discusses some of the best practices organizations can adopt to ensure that their journey to the next-generation data center remains on track.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

Dimension Data

Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

Optimize Security Operations with Next-generation MSS
sponsored by IBM
WHITE PAPER: This white paper describes why managed security services are a smart alternative to complex and unwieldy in-house security systems.
Posted: 14 Sep 2015 | Published: 31 Jul 2015


Endpoint Security: Beyond Antivirus
sponsored by
EBOOK: In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement