IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN Reports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Five Things IT Pros Should Know About Hyper-Convergence
sponsored by Hewlett Packard Enterprise
RESOURCE: Maybe you're considering adopting hyper-converged technology for your data center—but do you have a full working knowledge of its ins and outs? Uncover in this infographic the top 5 things IT pros should know about hyper-converged infrastructure (HCI). Get answers to some of your biggest questions now.
Posted: 27 Feb 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

Sky Entertainment Company Benefits from Automated Compliance Reporting
sponsored by Snow Software
CASE STUDY: Access this case study to examine how Sky (Europe's leading entertainment company) streamlined previously arduous and manual steps to generate Effective License Positions (ELPs) by integrating automated compliance reporting into their software asset management system.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Snow Software

2017 Annual Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Learn how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment. Discover how to reduce attackers' operational space and uncover the report's key findings about attacker behavior, threat management, vulnerability management, and more.
Posted: 28 Feb 2017 | Published: 31 Jan 2017

Cisco Systems, Inc.

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

Risk Management: Best and Worst Practices
sponsored by BitSight
EGUIDE: Discover the downsides to digitization, how to manage the risk to your organization's data, and 5 top IT risk management mistakes.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

BitSight

Sonicwall 2017 Annual Threat Report
sponsored by Dell SonicWALL
WHITE PAPER: The threat landscape evolved and shifted over the course of 2016, pushing the arms race between security professionals and cybercriminals to new heights. In this 2017 annual threat report discover key findings, vital takeaways, and a look to the future cybersecurity threat landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Dell SonicWALL

2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Symantec & Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement