EGUIDE:
In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
WHITE PAPER:
It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
WHITE PAPER:
Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
EGUIDE:
The retail industry is evolving alongside the emergence of new technologies. In this 15-page buyer's guide, Computer Weekly looks at how retailers are using AI, the importance of good digital customer experience and how mobiles have transformed the purchasing process.
EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
WHITE PAPER:
This paper compares the TCO of Oracle11g and Sybase ASE 15 databases, and demonstrates Sybase as the clear winner. Read this paper to learn why enterprises choose Sybase ASE on Linux for mission-critical applications that demand lightning-fast performance.
ESSENTIAL GUIDE:
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
WHITE PAPER:
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications.
EGUIDE:
Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.