IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed   
GTIN Reports
 
RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Top 2019 IT Service Management Tools Compared
sponsored by ServiceNow
ANALYST REPORT: IT service management (ITSM) tools are the backbone of IT departments around the world. But not all ITSM offerings are created equal. In this Gartner Magic Quadrant report, find out how the top ITSM tools of 2019 stack up against one another.
Posted: 10 Sep 2019 | Published: 29 Aug 2019

ServiceNow

Keeping Users Safe from Advanced Threats and Unsolicited Content
sponsored by Barracuda Networks
PRODUCT OVERVIEW: How can you stop advanced malware from breaching your network perimeter and stealing your valuable data? The following paper explains how to confront—and thwart—these threats using a cloud-based firewall that combines multiple layers of detection for all threat vectors with on-the-fly sandbox execution of unknown files.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Manage and Mitigate IT Risk
sponsored by Red Hat
PRODUCT OVERVIEW: Inside, learn more about Red Hat Insights, a predictive operating system analytics tool now included as a SaaS solution alongside new Enterprise Linux subscriptions. You'll get a closer look at how its predictive analytics platform can proactively identify threats to system availability, security, performance, and more.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

TOPICS:  IT Systems | Linux
Red Hat

The 3 Core Components of BMC Helix
sponsored by BMC
PRODUCT OVERVIEW: Both internal and external service management strategies are in the midst of a substantial paradigm shift thanks to the growing viability of cognitive technology and automation. Inside, dive into the three core elements that comprise a modern cognitive service management strategy.
Posted: 16 Jul 2019 | Published: 16 Jul 2019

BMC

Don't Undermine Your Move to Hybrid Cloud with the Wrong Infrastructure Choices
sponsored by Hitachi Vantara and Cisco Systems
WHITE PAPER: The following TechTarget-produced custom white paper investigates why converged infrastructure (CI) is a good fit for hybrid cloud environments and illustrates 7 reasons why CI lends itself well to hybrid cloud.
Posted: 26 Aug 2019 | Published: 26 Aug 2019

Hitachi Vantara and Cisco Systems

Case Study: How supercomputing is transforming experimental science
sponsored by ComputerWeekly.com
EGUIDE: NERSC lead data scientist Debbie Bard talks about how large-scale data analytics using super computers is making new types of science possible
Posted: 09 May 2019 | Published: 09 May 2019

ComputerWeekly.com

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

Business-critical Hyperconverged Workload Performance Testing with Dell EMC VxRail
sponsored by Dell EMC
ANALYST REPORT: This report shares the results of ESG's technical audit of Dell EMC VxRail hyperconverged infrastructure (HCI), testing its performance on tier-1 workloads and business value. Read the results now to learn how your company may benefit from deploying HCI for its business-critical workloads.
Posted: 06 Sep 2019 | Published: 31 Aug 2019

Dell EMC

Data Enrichment Will Be the New Correlation
sponsored by Kentik
RESOURCE: Data is only as valuable as the analytics tools used to extract insights. In the world of IT operations, this is especially true. That's where AIOps is intended to come into play. Jump inside this blog post to learn about the three primary analytics areas where AIOps practices shine the brightest.
Posted: 21 Aug 2019 | Published: 26 Jul 2019

Kentik
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement