Hardware  >   Peripheral Hardware  >   User Input Devices  >  

Scanners (Barcode)

RSS Feed    Add to Google    Add to My Yahoo!
Scanners (Barcode)Reports
 
Guide to Scanning Technologies
sponsored by Intermec
WHITE PAPER: Intermec is uniquely positioned to guide you through technical information and different scanning applications so you will be able to make informed choices about what will work best for you.
Posted: 09 Mar 2007 | Published: 01 Dec 2003

Intermec

Zebra. We Tag It - E-Book
sponsored by Zebra Technologies
EBOOK: When you tag it, you can see it, measure it, and learn from it. Tagging gives visibility into business to make the right decisions, at the right time, with the right information. Zebra can tag it with everything from bar codes to badges to RFID. Get the right information to do it better. All you have to do is tag it.
Posted: 18 Apr 2011 | Published: 18 Apr 2011

Zebra Technologies

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Top 5 SQL Server Cluster Setup Mistakes
sponsored by Idera
WHITE PAPER: Uncover the top 5 SQL Server cluster setup mistakes and learn how to avoid them.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Idera

Sharpening Your Competitive Edge with B2B Managed Services
sponsored by OpenText GXS
WHITE PAPER: Find out what an effective B2B managed services solution should provide so you can improve the capabilities of your business, and the efficiency of your supply-and-demand chain.
Posted: 30 May 2014 | Published: 30 May 2014

OpenText GXS

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Remote Office Infrastructure – A Microsoft Hyper-V Server 2012 Reference Architecture on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Access this in-depth resource to find out how this converged hardware solution can help you design your branch office IT environment.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

3D printing: bringing better products to market faster
sponsored by Stratasys Singapore Pte Ltd
WHITE PAPER: Discover how 3D printing can help your organization bring better products to market faster.
Posted: 28 Apr 2014 | Published: 28 Feb 2014

Stratasys Singapore Pte Ltd

What can go wrong with counterfeit parts : What unauthorized support providers don't tell you - Government Finance customer
sponsored by Hewlett-Packard Company
CASE STUDY: Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts.
Posted: 24 Jan 2014 | Published: 30 Nov 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement