IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed    Add to Google    Add to My Yahoo!
Global Trading Identification Numbers Reports
 
ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

How European Enterprises Are Preparing for Cybercrime
sponsored by Hewlett-Packard Limited
WHITE PAPER: This report reveals the results of a survey assessing Europe's cybercrime readiness.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Hewlett-Packard Limited

Strategy Considerations for Building a Security Operations Center
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SOCs and gives essential advice on designing one that will work for you.
Posted: 24 Jun 2015 | Published: 31 Dec 2013

IBM

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Value of Security Analytics & Anomaly Detection
sponsored by Prelert
RESEARCH CONTENT: In this infographic you will find the results of an EMA research report, digested for easy consumption and action.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Prelert

Unified Mobile Device, App and Data Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can implement a solution that unifies mobile app and network security technologies, eliminating headaches for IT departments.
Posted: 04 Jun 2015 | Published: 02 Oct 2014

Pulse Secure

ThreatAnalyzer: Better Defend Your Network from Targeted Attacks
sponsored by Threat Track Security
WEBCAST: This webcast gives you the details on a comprehensive, reliable anti-malware system.
Posted: 04 Jun 2015 | Premiered: Feb 19, 2015

Threat Track Security

Advanced Persistent Threat Protection and Detection
sponsored by Threat Track Security
EGUIDE: This e-guide guide offers expert advice for combatting APTs in the face of a shifting security landscape.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Threat Track Security

Securing Your Content Delivery Network
sponsored by Limelight Networks, Inc.
WHITE PAPER: In this brief white paper, you'll discover an in-network detection and attack mitigation solution that takes all the headaches out of content delivery network security.
Posted: 15 May 2015 | Published: 15 May 2015

Limelight Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement