IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed    Add to Google    Add to My Yahoo!
Global Trading Identification NumbersReports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Mitigating Risks of Cloud Computing with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines an overview of cloud computing, highlighting its advantages as well as its concerns.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Symantec Corporation

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

How Security Information and Event Management Solutions Perform in the Real World
sponsored by IBM
WHITE PAPER: In this Ponemon Institute study, get the facts on today's best SIEM solutions and how they perform in real-world scenarios.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Disrupt Advanced Attacks and Prevent Loss with this Integrated Security Solution
sponsored by IBM
WHITE PAPER: Access this informative whitepaper to explore a new integrated, contextually-aware security solution that provides improved threat detection and prevention across the enterprise.
Posted: 12 Sep 2014 | Published: 31 May 2014

IBM

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Manage Security and Risk
sponsored by Intel Security
WHITE PAPER: Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement