Bar Code Scanners White Papers

(View All Report Types)
The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

A Bathwick Group white paper: A foundation for database simplification, consolidation and cost reduction
sponsored by IBM
WHITE PAPER: This white paper challenges several assumptions about scale-out architectures and explains how consolidation and virtualisation can help you regain control over your infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

IBM

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Oracle Exalogic Elastic Cloud: System Overview
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn about Oracle Exalogic Elastic Cloud, an Engineered System consisting of software, firmware, and hardware designed to meet the highest standards of reliability, serviceability and performance.
Posted: 09 Apr 2012 | Published: 15 Sep 2011

Oracle Corporation

Virtualizing the Client PC: A Proof of Concept
sponsored by Intel Corporation
WHITE PAPER: In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Intel Corporation

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 12 Mar 2012 | Published: 30 Sep 2010

Oracle Corporation

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola Solutions
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola Solutions

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

What to Look For in a Web Application Scanner
sponsored by TechTarget Security
EBOOK: With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

TechTarget Security

Successfully Scanning Shipping Container Codes
sponsored by Intermec
CASE STUDY: Read this case study to learn how a large European shipping company integrated an Intermec Imaging Solution to resolve issues associated with their manual recording process of container codes and estimates considerable man-hour savings and improved container code recording accuracy.
Posted: 13 Aug 2013 | Published: 13 Aug 2013

Intermec

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

The Global Supply Chain: Under New Management
sponsored by TechTarget ERP
EBOOK: Get a primer on the supply chain management software and hardware that can help you get a handle on global supply chain risks.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

TechTarget ERP

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Warehouse Management Better Business Practices: Cycle and Annual Counting
sponsored by VAI, Vormittag Associates, Inc.
BOOK: This first chapter of Better Business Practices Series, explores the many benefits of cycle counting. Chief among them is the elimination of an annual physical count of your inventory. While cycle counting is the preferred inventory counting process, many companies still conduct annual counts.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

VAI, Vormittag Associates, Inc.

Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Tips for smoothing the rough edges in your hybrid paper-digital EHR workflow
sponsored by Kodak Alaris
EGUIDE: This E-Guide explores how hospitals can integrate scanning into their hybrid paper-digital workflow. Moreover, learn how, by doing so, your organization is more likely to receive incentives and achieve meaningful use objectives.
Posted: 21 Jun 2012 | Published: 21 Jun 2012

Kodak Alaris

The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility
sponsored by Motorola RFID Solutions
WHITE PAPER: Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.
Posted: 23 Feb 2010 | Published: 30 Nov 2007

Motorola RFID Solutions

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Bridge the Network Security Gap in IP Multifunction Machines
sponsored by HP Inc
EGUIDE: In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

HP Inc

Staying Connected: Don't Let Faulty Mobile Applications Lose Customers
sponsored by TechTarget Customer Experience
EBOOK: Mobile applications are quickly becoming the most common way customers interact with businesses, and can often make or break a customer's experience. In this expert e-book, explore what customers expect from mobile applications and discover the technologies and practices you'll need to create useful, engaging mobile apps.
Posted: 20 May 2013 | Published: 20 May 2013

TechTarget Customer Experience

MicroScope - January 2020: SMEs and managed services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

E-Book: Technical Guide on Web Application Firewalls
sponsored by TechTarget Security
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

TechTarget Security

IT in Europe: Breaking the Code: Are passwords destined for obscurity?
sponsored by TechTarget ComputerWeekly.com 
EZINE: This feature examines the current state of password security and explains why passwords are no longer an effective means of authentication on their own. Uncover viable alternatives, such as two-factor authentication, biometrics and cloud-based IAM services.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

TechTarget ComputerWeekly.com 

Weber Initiates Efforts to Provide RFID Technology to Its Customers
sponsored by Weber Marking Systems
PRESS RELEASE: A program aimed at providing the systems and supplies that will help companies meet RFID compliance standards.
Posted: 19 Apr 2004 | Published: 01 Apr 2004

TOPICS:  RFID
All resources sponsored by Weber Marking Systems

Spinning Context Into Web Design
sponsored by TechTarget Content Management
EBOOK: In this resource, experts determine the increasing relevancy of WCM from the perspective of the always-on customer. Access now to uncover methodologies for planning, customizing, and distributing content within the context of each user.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

TechTarget Content Management

Secrets Scanning Checklist
sponsored by Palo Alto Networks
WHITE PAPER: Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.
Posted: 08 Nov 2023 | Published: 08 Nov 2023

TOPICS:  .NET
Palo Alto Networks

Computer Weekly buyer's guide to mobile app development
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 08 Feb 2021 | Published: 27 Feb 2018

TechTarget ComputerWeekly.com

Low-Code Apps for Dummies 2nd ServiceNow Special Edition
sponsored by ServiceNow
EBOOK: In this 64-page ultimate guide to low-code application development, discover what questions you should ask before building, 10 development tips, and much more.
Posted: 18 Jan 2024 | Published: 19 Jan 2024

TOPICS:  .NET
ServiceNow

Warehouse management tips, techniques, and technologies
sponsored by IQMS
EBOOK: This eBook explains the benefits of warehouse management systems (WMSs) and how to boost their effectiveness through integration with related technologies, such as labor management systems (LMSs) and RFID.
Posted: 05 Sep 2011 | Published: 05 Sep 2011

IQMS