Applying RFID Technology in High Volume Manufacturing
By: Intel Corporation View more from Intel Corporation >>
Download this next:
Smart stores revolutionize the retail experience
By: T-Mobile for Business
Type: Infographic
Smart stores leverage 5G and IoT for personalized shopping, fast checkout, and real-time stock updates. 86% of shoppers share data for tailored experiences, which smart carts, touchless payments, kiosks, and chatbots enhance. IoT devices adjust pricing and smart mirrors allow virtual try-ons.
Additionally, retailers see operational gains and cost savings; IoT cuts energy costs by 15%, RFID tags aid loss prevention, and robots may improve worker satisfaction. Discover more of the benefits of 5G and IoT in retail through this infographic, highlighting customer experience, efficiency, and eco-friendliness.
These are also closely related to: "Applying RFID Technology in High Volume Manufacturing"
-
New findings on passwordless security
By: OpenText
Type: Analyst Report
Recent findings show that 80% of all breaches use compromised identities and can take up to 250 days to identify.
Passwordless security presents a potential means of securing these identities.
This white paper presents the findings of a new survey commissioned by OpenText and conducted by Dark Reading, aiming to shed insight into the state of passwordless security.
Download the report to unlock the findings and learn how passwordless is changing the access management landscape.
-
6 steps to establishing a future-ready warehouse
By: Zebra Technologies
Type: White Paper
When a warehouse is the center of your business, integration can be key to operational success.
This white paper details 6 operational issues that can arise from warehouse fragmentation.
To begin integrating your warehouse, you can:
- Equip workers with modern, mobile technology,
- Improve staff communication
- And acquire advanced storage capabilities.
Read on to learn 3 other steps for achieving warehouse integration.
Find more content like what you just read:
-
Top Cloud Trends for IT Leaders
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the market potential for public cloud services in the Asia-Pacific (APAC) region, Oracle's plans to meet the cloud computing needs of APAC enterprises and how perennial concerns around cloud security are being addressed by the industry.
-
Top 10 ANZ IT stories of 2022
By: TechTarget ComputerWeekly.com
Type: eGuide
In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
-
Driving Change in the Digital Age
By: TechTarget ComputerWeekly.com
Type: eBook
What separates leaders from laggards in digital transformation? In this e-guide, find out what it takes for CIOs to successfully navigate digital transformation strategy and challenges.
-
IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
By: TechTarget ComputerWeekly.com
Type: eGuide
Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments.
-
What to expect in unified communications over the next decade
By: TechTarget Security
Type: eGuide
This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.
-
How do cybercriminals steal credit card information?
By: TechTarget ComputerWeekly.com
Type: eGuide
Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
-
Key findings from a warehousing vision study
By: Zebra Technologies
Type: White Paper
By 2028, experts expect the global footprint of warehouses to increase by 19%. Zebra Technologies conducted a study with over 1,400 warehousing professionals to better understand the future of technology and innovation for warehousing. Download this white paper now to unlock the findings of the study.
-
IoT buyer's guide: 6 essential wireless features
By: Cradlepoint
Type: White Paper
Getting your first few connected devices to market can feel like a monumental accomplishment. Luckily this IoT Buyers' Guide is here to help by providing some important questions, options, and best practices regarding cellular connectivity, security, and flexibility for a variety of enterprise IoT use cases.
-
A 5-step process to optimize PPI
By: Conduit
Type: White Paper
In recent years, physician preference items (PPI) have become a particularly hot topic, with various PPI selections accounting for 40% to 60% of total supply costs for most hospitals. Read this white paper to access a 5-step process to optimize PPI and help C-suite leaders reduce costs while still ensuring physicians get the tools they need.
-
Your guide to Artificial Intelligence in ASEAN
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how financial institutions are using AI-powered chatbots to serve customers, what AI means for the future of work and how one Singapore-based startup is using declassified military methodologies to produce data-driven insights.
-
Reimagine the in-store experience
By: Amazon Web Services
Type: eBook
The power of Smart Stores. Physical stores still represent 80 percent of retail sales, making exceptional in-store service a modern imperative. With AWS Smart Store capabilities, you can: Update digital technologies in physical stores, empower advanced in-store operations, and provide a seamless checkout experience for customers.
-
MicroScope - December 2017: Unlock the potential of DaaS
By: MicroScope
Type: Ezine
This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.
-
The Evolution of the ‘Big Data’ Concept
By: TechTarget Business Analytics
Type: eGuide
Access this exclusive guide to analyze the evolution of the big data concept. Examine how many analysts are coming to believe that the 3-V definition falls short. Continue on to delve further into the big data discussion and discover how Gartner, who originally introduced the 3-V concept, has begun to build on this rudimentary interpretation.
-
Why self-service is mission critical for today's retailers
By: Diebold Nixdorf
Type: Product Overview
The retail sector is one of the fastest changing markets. While most retailers can only react, the ones that get ahead are the ones who can stay ahead of customer demands. To do that, you need flexibility built into your systems and a POS system that can support whatever configuration or design you can imagine. Read on to learn more.
-
A Computer Weekly buyer's guide to next-generation retail technology
By: TechTarget ComputerWeekly.com
Type: eGuide
Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
-
The future of enterprise IT: Social, social, mobile, analytics and cloud
By: TechTarget ComputerWeekly.com
Type: eGuide
Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.
-
Computer Weekly 19 February 2019: When is it best to stick with paper?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.
-
How Sestra Systems achieves consistent cloud connectivity
By: Cradlepoint
Type: Case Study
As a provider of IOT-based smart beverage dispensers, Sestra Systems needs consistent connectivity to operate—even during network outages. So, how does the business ensure such connectivity? By partnering with Cradlepoint. Dig into this case study to learn how Cradlepoint’s cellular broadband enables connectivity success for Sestra Systems.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Best Practices for mobile authentication
By: TechTarget Security
Type: eGuide
Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
-
30-page e-book: IoT security benchmark report 2023
By: Palo Alto Networks
Type: eBook
81% of security leaders surveyed by Starfleet Research reported that their business was struck by an IoT-focused attack within the past year. So, how can you boost IoT security at your own organization? Find guidance in this 30-page e-book.
-
Datacentre Management
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.
-
Top OT cybersecurity risks & how to defend against them
By: Nomios
Type: eBook
As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.
-
Big data analytics & innovation in Australian healthcare
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out how healthcare providers in Australia and the rest of APAC have successfully tapped the power of data analytics and other related technologies to advance digital health and better position themselves to cope with the growing demand for healthcare.
-
The pandemic's e-commerce boom
By: TechTarget ComputerWeekly.com
Type: eGuide
The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.
-
8 actions for stronger OT cybersecurity
By: Nomios
Type: eBook
Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.
-
Royal Holloway: Cloud-native honeypot deployment
By: TechTarget ComputerWeekly.com
Type: Research Content
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Tackling cyber challenges in the transport & logistics sector
By: Vodafone
Type: eBook
In this eBook, you’ll learn about what issues transport and logistics organizations are facing, key trends that are impacting the sector, and how technology can help these firms be better prepared to overcome the challenges of today and the future. Read the eBook here.
-
The UK manufacturing sector needs a digital upgrade
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer's guide looks at enterprise social media and collaboration tools. And we find out how data science is helping to boost cyber security strategies. Read the issue now.
-
24-page e-book: IoT security in retail
By: Palo Alto Networks
Type: eBook
By 2030, IoT technology in retail is expected to increase to $297 billion, according to a 2023 report by Grand View Research. So, what is driving that massive adoption, and how can retail organizations ensure strong IoT security? Find answers in this 24-page e-book.
-
A hybrid approach: How the conversation around cloud is changing
By: TechTarget ComputerWeekly.com
Type: eGuide
Enterprise cloud migrations used to be discussed in absolute terms. In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.
-
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
-
Proactive Field Service Roadmap: 5 Key Priorities
By: ServiceNow
Type: eBook
This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.
-
Data-driven physical retail: 10-page paper
By: Avanade
Type: White Paper
To discover how a data-driven approach can revolutionize physical retail experiences, for customers and employees alike, explore this 10-page white paper.
-
Computer Weekly 29 January 2019: A vintage digital transformation for Majestic Wines
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
-
The Business Bottleneck
By: VMware Tanzu
Type: eBook
When it comes to digital transformation and making better use of your software solutions, there is often a disconnect between IT and the rest of the business. How a business utilizes their software to enhance the customer experience is what separates them from the competition. Read on to learn how to use software to run and develop your business.
-
Computer Weekly – 30 May 2023: Can the UK cash in on chips?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
-
Computer Weekly – 20 June 2023: How to keep network costs affordable
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, as demands for networking performance and speed increase, we examine how to keep a handle on costs. Chip makers are investing in PLC flash technology but some think it won't be worth the effort; we investigate. And we listen in as tech industry leaders and politicians discuss the regulation of AI. Read the issue now.
-
Best Practices for Managing and Understanding Mobile Authentication
By: TechTarget Security
Type: eBook
In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
What Is an AI-driven Enterprise?
By: Nomios
Type: eBook
Inside this e-book, “What Is an AI-driven Enterprise?” you’ll learn about the evolution of AI, what constitutes an AI-driven business, and the building blocks that can enable your organization to attain that status.
-
Mobile Payments Using Host Card Emulation with NFC
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Beginner's guide to Internet of Things
By: TechTarget ComputerWeekly.com
Type: eGuide
The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
-
Upgrading to 802.11n
By: TechTarget Security
Type: eGuide
This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.
-
Bitcoin, App Security, and Oracle's Controversial Licensing Policies
By: TechTarget ComputerWeekly.com
Type: Ezine
Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
-
How Brexit will affect your security online
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, DevOps is cited as a key element of digital transformation – we examine the challenges to delivering on its promise. Many retailers are investing in emerging technologies to gain an edge – but are they too far ahead of the curve? And could a new spirit of collaboration help UK broadband roll-out? Read the issue now.