IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed    Add to Google    Add to My Yahoo!
Global Trading Identification Numbers Reports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

What Makes Two Security Programs Different?
sponsored by Prelert
WHITE PAPER: This blog post compares two anomaly detection programs and discussing their rate of false positives, ability to analyze multiple instances, and more.
Posted: 19 Mar 2015 | Published: 04 Nov 2013

Prelert

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Data masking everywhere
sponsored by IBM
WHITE PAPER: Read this white paper now to learn how data masking can protect your sensitive information from hackers.
Posted: 16 Mar 2015 | Published: 31 May 2014

IBM

Backup & Disaster Recovery Services: A High-Value Offering with Substantial Profit Potential for MSPs
sponsored by Kaseya
WHITE PAPER: Access this white paper to learn why BDR is a top priority for companies of all sizes, and why it is the first step to a managed service practice for solution providers.
Posted: 27 Mar 2015 | Published: 31 Dec 2013

Kaseya

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

The Secret To Reducing False Alerts
sponsored by Prelert
WHITE PAPER: Take a look at this brief article to discover how anomaly detection can lower your rate of false positives.
Posted: 23 Mar 2015 | Published: 22 May 2014

Prelert

Anomaly Detection in Unstructured Data
sponsored by Prelert
WHITE PAPER: This article introduces an anomaly detection program aimed to aid with the analysis of unstructured data.
Posted: 23 Mar 2015 | Published: 27 Feb 2015

Prelert

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement