WHITE PAPER:
Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
EGUIDE:
In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
WHITE PAPER:
It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
EZINE:
In this week's Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now.
WHITE PAPER:
This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
WHITE PAPER:
Maintain operational efficiency while cutting supply chain costs with new approaches, technologies, and methodologies. Third party logistics providers, radio frequency identification rentals, and attribute-based demand planning can help you reduce supply chain costs and boost customer satisfaction.
WHITE PAPER:
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
WHITE PAPER:
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.