Automatic Data Collection White Papers

(View All Report Types)
Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

Make the Right Database Investment
sponsored by Sybase, an SAP company
WHITE PAPER: This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

Sybase, an SAP company

Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER: The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005

Intel Corporation

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test
sponsored by National Instruments
WHITE PAPER: As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol.
Posted: 21 Jul 2008 | Published: 01 Jan 2006

National Instruments

Retail Fashion Market RFID Solutions
sponsored by Motorola Solutions
WHITE PAPER: This whitepaper explains how Radio Frequency Identification (RFID) provides real-time inventory visibility so you can react quickly to inventory demand and stocking levels, helping ensure that the right product is available for your customers at the right
Posted: 22 Jul 2008 | Published: 01 Jan 2007

Motorola Solutions

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems