IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Bar Codes

RSS Feed   
Bar Codes White Papers (View All Report Types)
 
The Need for SOA to Achieve Flexibility and Agility within Plant Operations
sponsored by Apriso Corporation
WHITE PAPER: This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS).
Posted: 29 Aug 2008 | Published: 28 Aug 2008

Apriso Corporation

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Public Key Infrastructure (PKI) Buyers Guide
sponsored by Entrust, Inc.
WHITE PAPER: When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

Entrust, Inc.

Ransomware Realities for Small and Medium-Sized Businesses
sponsored by CrowdStrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020

CrowdStrike

SASE Series, Part 2: The Security View
sponsored by Hughes Network Systems
WHITE PAPER: A term coined by Gartner, Secure Access Service Edge (SASE) is an approach to network security designed to be the successor to data centers as organizations shift their data and endpoints to the cloud. In this blog post, dive deeper into the SASE approach, the growing attack surface, and its relationship with zero trust.
Posted: 07 May 2020 | Published: 30 Apr 2020

Hughes Network Systems

Omdia Market Radar: Zero-Trust Access
sponsored by Cloudflare
WHITE PAPER: Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.
Posted: 04 May 2020 | Published: 17 Mar 2020

Cloudflare

Five IT Fitness Journey Maps for True Enterprise Agility
sponsored by ServiceNow
WHITE PAPER: Get an executive overview of each of the five IT fitness maps that lead towards fully realized enterprise agility – and learn how to start chartering your organization’s journey towards the end goal.
Posted: 18 May 2020 | Published: 18 May 2020

ServiceNow

Buyers Guide to Edge Infrastructure Management Solutions
sponsored by Schneider Electric
WHITE PAPER: Open this guide for steps to take when evaluating edge infrastructure monitoring solutions, from specifications you will likely need to find, to questions to ask of the companies you’re considering.
Posted: 29 May 2020 | Published: 29 May 2020

TOPICS:  IT Systems
Schneider Electric
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info