IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Global Trading Identification Numbers

RSS Feed   
Global Trading Identification Numbers White Papers (View All Report Types)
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

ABCs of RFID: Understanding and Using Radio Frequency Identification
sponsored by Intermec
WHITE PAPER: This white paper provides an overview of RFID technology and capabilities, describes the common frequencies and technologies used in business applications, identifies major standards, and introduces ways to take advantage of RFID to improve convenience, accuracy, safety and security.
Posted: 04 Mar 2009 | Published: 04 Mar 2009


Data Breaches: Protect Your Organization with an Incident Response Program
sponsored by Cisco Systems, Inc.
WHITE PAPER: When a data breach occurs, your organization could be open to hackers and cybercriminals for up to 200 days. Thankfully, building a rapid incident response program isn't difficult, once you know how. This white paper outlines the critical process and major roles that can make that a reality.
Posted: 20 Sep 2017 | Published: 31 Dec 2015

Cisco Systems, Inc.

Providing Support for the Critical Practices of Process and Decision Modeling
sponsored by Signavio
WHITE PAPER: To implement real change requires changing the way you think about your long-term goals, and adopting a system like Business process and Business Decision modeling. In this white paper, we will look at the fundamental factors that lead a company to embrace process and decision modeling as a critical, shared practice business management.
Posted: 23 Jan 2018 | Published: 30 Jun 2017


What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016


How to Create a Scalable Threat Model
sponsored by Synopsys
WHITE PAPER: Find out how to make threat modeling more efficient and cost-effective with an automated, scalable, template-based approach.
Posted: 12 Jan 2018 | Published: 21 Sep 2017


Edge IT: The Engine Powering Digital Transformation
sponsored by Equinix
WHITE PAPER: In the age of digital transformation, what does the edge of your IT landscape look like? How are your peers approaching it? Read this guide to find out how other IT pros are approaching edge IT, trends in data center concentration, strategies to overcoming key challenges, and more.
Posted: 02 Nov 2017 | Published: 02 Nov 2017


Hyperconverged Infrastructure: Understanding Workloads, Data Services, and Costs
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report covers the major variations in workloads and data services that can impact your HCI selection. Read on to learn the critical contributors involved in formulating a comprehensive, economic model for evaluating HCI—and why storage is at the heart of evaluation.
Posted: 10 Aug 2017 | Published: 08 Mar 2017

Hewlett Packard Enterprise

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years. Discover best practices already in place in financial service firms that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement