Bar Code Readers White Papers

(View All Report Types)
Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Reduce data center complexity when you 'go virtual'
sponsored by HPE and Intel®
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE

Remote Office Infrastructure – A Microsoft Hyper-V Server 2012 Reference Architecture on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Access this in-depth resource to find out how this converged hardware solution can help you design your branch office IT environment.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

ESG: Economics of Flash Compared to Hard Disk
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the economic value of flash compared to hard disks and decide for yourself if flash is worth the investment.
Posted: 17 Mar 2015 | Published: 28 Feb 2015

IBM

Best Practices for successful IP Address Management (IPAM)
sponsored by Infoblox
WHITE PAPER: This white paper discusses several ways to develop a successful IPAM strategy.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Infoblox

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola Solutions
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola Solutions

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

The Global Supply Chain: Under New Management
sponsored by TechTarget ERP
EBOOK: Get a primer on the supply chain management software and hardware that can help you get a handle on global supply chain risks.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

TechTarget ERP

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

Warehouse Management Better Business Practices: Cycle and Annual Counting
sponsored by VAI, Vormittag Associates, Inc.
BOOK: This first chapter of Better Business Practices Series, explores the many benefits of cycle counting. Chief among them is the elimination of an annual physical count of your inventory. While cycle counting is the preferred inventory counting process, many companies still conduct annual counts.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

VAI, Vormittag Associates, Inc.

Securing Containers And Infrastructure As Code For Cloud-Native Software: The Why And The How
sponsored by Veracode
EBOOK: Along with highlighting 3 prevalent risks to container and IaC (infrastructure as code) security, this e-book instructs readers on how to mitigate those risks with a holistic approach to security. Continue on to unlock these insights.
Posted: 08 Jun 2023 | Published: 08 Jun 2023

TOPICS:  .NET
Veracode

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI
sponsored by IBM
EGUIDE: Read this expert Tip Guide for workable, profitable embedded software development best practices.
Posted: 20 Sep 2011 | Published: 01 Sep 2011

IBM

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI
sponsored by IBM India Pvt. Ltd
EGUIDE: Read this Tip Guide to discover workable, profitable best practices for embedded software development.
Posted: 25 Jan 2011 | Published: 01 Sep 2011

IBM India Pvt. Ltd

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility
sponsored by Motorola RFID Solutions
WHITE PAPER: Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.
Posted: 23 Feb 2010 | Published: 30 Nov 2007

Motorola RFID Solutions

New Zealand is taking the lead in cloud success: What are they doing right?
sponsored by TechTarget Data Center
EZINE: This issue looks at the adoption of a cloud code of practice for suppliers in New Zealand.
Posted: 03 Apr 2014 | Published: 04 Apr 2014

TechTarget Data Center

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

Modern Infrastructure: ASEAN Special Edition, April 2014
sponsored by TechTarget Data Center
EZINE: This issue looks at the adoption of a cloud computing in the Asean region with a case study from a Singapore based multinational. It also outlines the challenges and predictions for the region.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

TechTarget Data Center

Tips for success with adopting Agile
sponsored by IBM
EGUIDE: 'Agile' is the great buzz word these days, but how many people are really practicing Agile, and for how long? When the going gets tough, do they revert back to familiar, traditional habits? In this e-guide, learn expert tips for transitioning to Agile, how to prove its business value, and strategies for facing challenges with Agile projects.
Posted: 29 Nov 2011 | Published: 18 Nov 2011

IBM

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

Computer Weekly – 12 November 2019: The importance of digital accessibility
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine what retailers need to do to make their digital channels accessible for disa-bled people. We look at the rise of alternative desktop productivity tools to Microsoft Office. And our new buyer's guide covers next-generation programming tools such as no-code/low-code development. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Nov 2019

TechTarget ComputerWeekly.com

Software complexity, integration drive business rules automation adoption trend
sponsored by IBM
EGUIDE: Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

IBM

October 2013 Health IT E-Zine
sponsored by TechTarget Health IT
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

TechTarget Health IT

Infrastructure-as-Code in DevOps: Terraform Best Practices in Action
sponsored by Firefly
EGUIDE: Check out this e-guide for a deep dive into the role of infrastructure-as-code in DevOps, and learn the best practices your team needs when adopting new IaC tools.
Posted: 31 Jan 2023 | Published: 31 Jan 2023

TOPICS:  .NET
Firefly

MicroScope - January 2020: SMEs and managed services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER: This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008

Symantec Corporation