Global Trading Identification Numbers Reports

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

CW Nordics - February-April 2022: Swedish drone app gets life-saving equipment to heart attack victims
sponsored by TechTarget ComputerWeekly.com
EZINE: Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.
Posted: 15 Feb 2022 | Published: 24 Feb 2022

TechTarget ComputerWeekly.com

CW Middle East - April-June 2021: Qatari financial services regulator launches platform to help combat money laundering
sponsored by TechTarget ComputerWeekly.com
EZINE: The Qatar Financial Markets Authority is using a digital platform to enable financial services professionals to assess their knowledge of anti-money laundering and combating the financing of terrorism.
Posted: 31 Mar 2021 | Published: 15 Apr 2021

TechTarget ComputerWeekly.com

2020 Media Consumption Series - Why
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic based on the results of our 2020 Media Consumption Survey, find out why sales reps with data-driven intent get the best response and what subject line gets the open?
Posted: 08 Feb 2021 | Published: 19 Oct 2020

TechTarget ComputerWeekly.com

Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023

TechTarget ComputerWeekly.com

CW Europe - December 2021-February 2022: Norway embraces internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: Norway is becoming a centre of IoT innovation as tech developers tackle some of the country's unique challenges, in areas such as fish farming, power distribution and monitoring of boats.
Posted: 23 Nov 2021 | Published: 09 Dec 2021

TechTarget ComputerWeekly.com

Computer Weekly - 7 September 2021: Highways England delivers a digital roadmap
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CDIO of Highways England about her digital services and asset management plans. We also explore SIEM and SOAR security tools and we find out how McLaren Racing is using data analytics to build its cars more efficiently. Read the issue now.
Posted: 06 Sep 2021 | Published: 07 Sep 2021

TechTarget ComputerWeekly.com

Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
Posted: 16 Aug 2021 | Published: 17 Aug 2021

TechTarget ComputerWeekly.com

The Essential IT Automation Success Checklist
sponsored by Red Hat
PRODUCT OVERVIEW: Automation is a top business initiative for 60% of organizations. In this product overview, discover 5 ways you can use Red Hat Ansible Automation Platform to simplify your company’s automation management efforts.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

MITRE ATT&CK: Climb to the top
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The purpose of this article is to explain what the MITRE ATT&CK framework is and how it has become the de-facto industry standard for describing cyber adversarial behaviour. It will illustrate why it was created, why it can be considered a burgeoning cyber security ontology, and how it ended up being the one of the most widespread frameworks.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com