IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed   
GTIN Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

The Savings and Benefits of Ansible Tower
sponsored by Red Hat
WHITE PAPER: In this executive overview, get a closer look at the savings and operational benefits one organization realized through three-years of using Red Hat Ansible Tower, including a 146% ROI, a 67% reduction in man hour requirements to deliver on customer agreements, and more.
Posted: 02 Dec 2019 | Published: 29 Jun 2018

TOPICS:  IT Systems
Red Hat

When the Cloud Rains Phish
sponsored by Area 1 Security
WHITE PAPER: When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

Area 1 Security

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

Business Email Compromise: The Catalyst for Mailbox Level Email Security
sponsored by Ironscales
WHITE PAPER: As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Ironscales

Cloud can mean better security, not less security
sponsored by Capgemini
RESOURCE: While security concerns are legitimate, businesses cannot afford to let security challenges hold them back from embracing cloud technology. Especially since cloud also offers security advantages. In this article, uncover 3 categories of cloud security concerns and explore the tactics and technologies that can enhance cybersecurity efforts.
Posted: 18 Dec 2019 | Published: 27 Sep 2018

Capgemini

Native Persistent Data Orchestration for Kubernetes
sponsored by HammerSpace
DATA SHEET: Download this datasheet to view a data management approach equipped to deliver the agility, control, and efficiency that Kubernetes workloads require, abstracting data at file-level granularity from the infrastructure so that any storage system can natively serve data to Kubernetes persistent volumes.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

HammerSpace

ZeroNorth 2019 End of Year Report
sponsored by ZeroNorth
WHITE PAPER: 2019 has been a formative year in cybersecurity – growing security risks and compliance regulations put pressure on organizations to rethink their current strategy. This annual report highlights key statistics to show where the security landscape is trending to help you position yourself for success in 2020.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ZeroNorth

The Right Way to Combat Customer Journey Hijacking
sponsored by Tala Security
WHITE PAPER: Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Case Study: Optimizing Aging IT Processes with Automation and Machine Learning
sponsored by Ayehu
CASE STUDY: See firsthand how a multi-national company counteracted aging and ineffective IT practices through automation, analytics-driven support tools, and even machine learning – all to earn their competitive edge back.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

Ayehu
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info