Automated Data Capture Reports

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
sponsored by TechTarget ComputerWeekly.com
EZINE: Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
Posted: 08 Feb 2021 | Published: 10 Oct 2019

TechTarget ComputerWeekly.com

Tightening the Chain - Supply Chain Cost-Cutting Strategies
sponsored by SAP America, Inc.
WHITE PAPER: Maintain operational efficiency while cutting supply chain costs with new approaches, technologies, and methodologies. Third party logistics providers, radio frequency identification rentals, and attribute-based demand planning can help you reduce supply chain costs and boost customer satisfaction.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility
sponsored by Motorola RFID Solutions
WHITE PAPER: Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.
Posted: 23 Feb 2010 | Published: 30 Nov 2007

Motorola RFID Solutions

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco

Identity-Aware Networking
sponsored by Extreme Networks
WHITE PAPER: When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Extreme Networks