IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Barcoding

RSS Feed   
Barcoding Reports
 
Herding Geese: The Retail Supply Chain
sponsored by ComputerWeekly.com
BOOK: Steven Keifer draws on the pioneering work of US retailer, Walmart, to explain the essentials of EDI in the retail supply chain.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Everything you need to know about successful AIDC
sponsored by SearchERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchERP

The Need for SOA to Achieve Flexibility and Agility within Plant Operations
sponsored by Apriso Corporation
WHITE PAPER: This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS).
Posted: 29 Aug 2008 | Published: 28 Aug 2008

Apriso Corporation

The Global Supply Chain: Under New Management
sponsored by SearchERP
EBOOK: Get a primer on the supply chain management software and hardware that can help you get a handle on global supply chain risks.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

SearchERP

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info