IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

R F I D

RSS Feed    Add to Google    Add to My Yahoo!
R F I D Reports
 
Big data: Lessons from the leaders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

ComputerWeekly.com

Item-level RFID Tagging and the Intelligent Apparel Supply Chain
sponsored by Motorola, Inc.
WHITE PAPER: This paper provides an overview of item-level radio frequency identification (RFID) tagging in the apparel supply chain. It explains the evolution of RFID technology and details key benefits when utilized by retailers, distribution and logistics providers, and manufacturers.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

Motorola, Inc.

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks

Make the Right Database Investment
sponsored by Sybase, an SAP company
WHITE PAPER: This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

Sybase, an SAP company

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Retail Fashion Market RFID Solutions
sponsored by Motorola, Inc.
WHITE PAPER: This whitepaper explains how Radio Frequency Identification (RFID) provides real-time inventory visibility so you can react quickly to inventory demand and stocking levels, helping ensure that the right product is available for your customers at the right
Posted: 22 Jul 2008 | Published: 01 Jan 2007

Motorola, Inc.

Using Technologies to Increase Perfect Order Metrics
sponsored by Intermec
WHITE PAPER: Companies are continually finding new ways to get the right goods to the right customers on time. This white paper explains how each aspect of perfect order performance can be improved through enhancements to data collection processes and technologies.
Posted: 13 Aug 2008 | Published: 13 Aug 2008

Intermec

Leveraging RFID & Other Pervasive Technologies to Achieve Transaction Efficiency in Consumer Retailing
sponsored by Infosys Technologies Limited
WHITE PAPER: Providing customer satisfaction with retail operations allows organizations to gain the most revenue from their customers. Read this paper to learn how pervasive technology can be deployed to optimize operations and enable a superior customer experience.
Posted: 14 May 2007 | Published: 01 May 2006

Infosys Technologies Limited

Real Time Information for the Pervasive Enterprise
sponsored by Infosys Technologies Limited
PRODUCT LITERATURE: Real-time visibility into operations enables response to market dynamics and competition. Read this paper to learn how to leverage pervasive technologies to transform an organization into a pervasive enterprise.
Posted: 14 May 2007 | Published: 01 Oct 2006

Infosys Technologies Limited

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement