IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  


RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016

EMC Converged Platforms: VxRail Appliance
sponsored by Dell EMC
ANALYST REPORT: This informational white paper identifies the top ten factors driving the deployment of hyper-converged technology solutions, as well as introduces an appliance that brings together compute, storage, and virtualization in a single infrastructure. Read on to learn more about this fundamental industry solution.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

Dell EMC

10 Principles of Database Security Program Design
sponsored by Trustwave
WHITE PAPER: Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.
Posted: 03 Oct 2016 | Published: 31 Dec 2015


Evolving Threats: Changing Expectations for Enterprise Firewall Solutions
sponsored by Fortinet, Inc.
DATA SHEET: The need for the next evolution of enterprise security solutions is more pressing than ever. This Infographic provides insight into current key trends that are driving the evolving threat landscape. Read on to uncover unique strategies that you can employ effectively across your entire network to counter these threats.
Posted: 06 Oct 2016 | Published: 01 Aug 2016

Fortinet, Inc.

Raise the Bar on Your Data Center Efficiency
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this exclusive white paper, learn how to develop a cloud environment that is simple to use and easy to manage. Read on to speed your service delivery, lower costs, and increase the efficiency of your data center in its entirety with a hybrid cloud IT infrastructure.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016


Crafting an Identity-Based Security Strategy for Cloud
sponsored by Hewlett Packard Enterprise
EGUIDE: IAM tools play a critical role in enterprise cloud security, but it's important that you carefully consider your requirements before jumping in. In this e-guide, get tips from cloud industry expert David Linthicum on common IAM technologies and how you can construct an identity-based security model for the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Hewlett Packard Enterprise

Targeted cyber attacks in the UK and Europe
sponsored by
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement