UPC Reports

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

The Need for SOA to Achieve Flexibility and Agility within Plant Operations
sponsored by Apriso Corporation
WHITE PAPER: This white paper offers a check list that manufacturers can use for evaluating and comparing alternative Manufacturing Execution Systems (MES), Warehouse Management Systems (WMS) and Quality Management Systems (QMS).
Posted: 29 Aug 2008 | Published: 28 Aug 2008

Apriso Corporation

Unlocking Information: Digital data is a hospital’s most valuable resource
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

The Global Supply Chain: Under New Management
sponsored by TechTarget ERP
EBOOK: Get a primer on the supply chain management software and hardware that can help you get a handle on global supply chain risks.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

TechTarget ERP

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The Essential IT Automation Success Checklist
sponsored by Red Hat
PRODUCT OVERVIEW: Automation is a top business initiative for 60% of organizations. In this product overview, discover 5 ways you can use Red Hat Ansible Automation Platform to simplify your company’s automation management efforts.
Posted: 22 Apr 2024 | Published: 22 Apr 2024

Red Hat

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

CISO Success Stories: How security leaders are tackling evolving cyber threats
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to developer experience
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The better the working conditions of a software developer, the better the results. In this 15-page buyer’s guide, Computer Weekly looks at how to improve productivity, the tools required to build success and the value of in-house expertise.
Posted: 12 Sep 2023 | Published: 12 Sep 2023

TechTarget ComputerWeekly.com