RSS feed Get our RSS feed

News by Topic

rf code

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name
By: RF Code     Published Date: Sep 03, 2014
In the coming months, RF Code will launch the first of its planned new software tools, which the company says will enable users to add data relating to the physical datacenter to any number of other applications. Click here to get a preview.
Tags : rf code, sensor technology, rfid, radio frequency, data center power, power and cooling, energy savings
     RF Code
By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : security, malware, code signing, software, downloads
     Symantec Corporation
By: STARLIMS     Published Date: Jun 09, 2014
The laboratory is a strategic asset for your organization. Laboratory data comprises the majority of medical records and is critical for accurate diagnoses. Physicians depend on reliable laboratory result data to deliver optimal care. Efficiency is critical for laboratory success; it enables your lab to ensure patient safety, reduce operating costs and increase revenue. STARLIMS offers clinical laboratories a powerful solution suite, which includes configurable tools to manage complex testing workflows, enforce rules-based actions, promptly format and deliver laboratory results to clinicians by their preferred method, track and route bar-coded specimens within the lab and across the network for more efficiency, as well as distribute and manage bio specimen inventories.
Tags : nfusion, starlims, laboratory, laboratory system, data, strategic, physicians, healthcare
     STARLIMS
By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: IBM     Published Date: May 30, 2012
Learn how CPG and Wholesale Distributors are becoming more efficient, more innovative, more agile, and more competitive.
Tags : cpg, wholeshale, real time, plant floor, retail, ibm, rfid, bar code
     IBM
By: Tealium     Published Date: Dec 15, 2011
Tags slow down web sites. Tag management systems provide a solution using a number of methodologies ranging from asynchronous tagging, conditional loading and tag killing to improve site performance.
Tags : tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation
     Tealium
By: Tealium     Published Date: Dec 15, 2011
In the market for tag management systems? The "Buyer's Guide to Tag Management Systems" reveals the challenges associated with tagging, benefits provided by tag management systems, and features to consider when looking for such solutions.
Tags : tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation
     Tealium
By: Zebra     Published Date: Oct 12, 2011
Wireless bar code and radio frequency identification (RFID) label printing is widely recognized by major retailers globally as an essential technology for enhancing store operations. The pages that follow detail the far-ranging benefits of wireless bar code and RFID printing, and present innovative wireless printing solutions from Zebra.
Tags : zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions
     Zebra
By: Klocwork     Published Date: May 11, 2011
This white paper examines how the next generation of source code analysis tools are moving high-quality source code analysis to the developer's desktop and performing it at the earliest point in the development cycle - before code check-in. Learn why the developer must be an integral part of the process of identifying, fixing and preventing bugs from reaching the code stream.
Tags : klocwork, software development cycle, static analysis, source code analysis tool, developer desktop, code stream, productivity
     Klocwork
By: SPSS Inc.     Published Date: Mar 15, 2010
This paper focuses on six myths that surround direct marketing best practices and discusses how you can use specific analytical techniques and tools to beat these myths, increase response rates and boost ROI.
Tags : spss, direct marketing software, campaign optimization, response rate, roi, segmentation, cluster analysis, customer persona
     SPSS Inc.
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: APTX     Published Date: Nov 05, 2009
This paper examines the key performance aspects of low bit rate audio codecs for the next generation of bandwidth-efficient digital wireless microphone systems that meet the future needs of live events.
Tags : aptx, bit-rate, wireless microphone, audio codec, spectrum, compression ratio
     APTX
By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : .net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model
     DataDirect Technologies
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: Red Gate Software     Published Date: Oct 19, 2007
This short white paper discusses the common pitfalls and performance problems .NET developers come across when creating applications. The paper also presents several ways of getting around these issues, so that developers can make their .NET applications perform the way they should.
Tags : scalability, performance, performance problem, performance problems, .net, .net application, optimize code, .net profiling
     Red Gate Software
By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
     Infor
By: Intermec     Published Date: Mar 14, 2007
Smart printers are a smart investment. They eliminate the need for computers dedicated to controlling them, can act as PLCs to run other devices on production lines, enable fool-proof and error-proof bar code printing, and provide investment protection with advanced features like XML printing and RFID label encoding.
Tags : plc, programmable logic controllers, intermec, xml, rfid, erp, bar code printing, fault dots
     Intermec
By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid
     GAO RFID Inc.
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics