In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.