IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Uniform Product Codes

RSS Feed   
Uniform Product Codes White Papers (View All Report Types)
 
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

The Need for SOA to Achieve Flexibility and Agility within Plant Operations
sponsored by Apriso Corporation
WHITE PAPER: This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS).
Posted: 29 Aug 2008 | Published: 28 Aug 2008

Apriso Corporation

A Guide To Fraud In The Real World
sponsored by Splunk
WHITE PAPER: Protecting against fraud is a growing problem because so many parts of everyday life are being digitized. To remain secure, organizations need the ability to centrally search, detect, monitor and investigate fraud attempts. In the white paper, learn about 6 real-world scenarios where machine data can be used to stamp out fraud.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

Cutting Bait: How to Identify, Avoid, and Protect Against Phishing
sponsored by SkOUT
WHITE PAPER: How can you reduce your attack surface and prevent phishing threats? Read the following white paper, which explains how to identify, avoid, and protect against phishing and other cyber-attacks and provides 4 steps to improve online security.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

SkOUT

The SOAR Buyer's Guide
sponsored by Splunk
WHITE PAPER: Investing in a SOAR platform is a wise and highly strategic decision. After all, choosing the platform to build your SOC on is arguably more important than choosing any point security product. This white paper aims to outline the important criteria you should consider when evaluating SOAR platforms.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Splunk

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery
sponsored by HPE and Intel®
WHITE PAPER: Organizations looking to unbind themselves from the limitations of client/server era technologies should read this IDC white paper. It documents 4 critical considerations for evolving your VM backup strategies and explains how hyper-converged infrastructure (HCI) can improve and simplify data protection and disaster resiliency.
Posted: 05 Jun 2019 | Published: 30 Apr 2019

HPE and Intel®

Where to Invest Next to Mature Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

CrowdStrike

Automation First: A Practical Approach to IAM
sponsored by Hitachi ID
WHITE PAPER: This white paper explains why it's important to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights. Read on to learn more.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement