IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automatic Identification and Data Capture

RSS Feed   
Automatic Identification and Data Capture Reports
 
Everything you need to know about successful AIDC
sponsored by SearchERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchERP

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

It’s Time to Treat Your Organisation like your Smartphone
sponsored by SailPoint Technologies
WHITE PAPER: Traditional passwords are ill-equipped to be a standalone security measure. Today, most of our smartphones have evolved beyond passwords to include biometric authentication – so why haven’t organizations followed suit? Read on to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

SailPoint Technologies

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Case Study: Trasluz Casual Wear - Stylish Results in Children's Clothing
sponsored by Intermec
WHITE PAPER: Access this white paper today to learn more about how implementing a comprehensive track-and-trace solution brought success in this case study, and consider applying the solution to your own business!
Posted: 17 Oct 2013 | Published: 16 Oct 2013

Intermec

Web Application Vulnerability Report 2020
sponsored by Acunetix
WHITE PAPER: The threats that target web applications, websites and network perimeters change constantly. In order to provide relevant insights regarding these changes, Acunetix conducts an annual study to better understand these vulnerabilities. Download the full report to unlock the findings from 2020.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Acunetix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info