Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER:
Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007
|
|
|
CW Europe – December 2017
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.
Posted: 08 Feb 2021 | Published: 14 Dec 2017
|
|
|
Multifactor authentication: What are the pros and cons?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.
Posted: 05 Feb 2023 | Published: 06 Feb 2023
|
|
|
CW Middle East - Oct-Dec 2019: Saudi banks trial biometrics in ATMs
sponsored by TechTarget ComputerWeekly.com
EZINE:
Biometric and blockchain technologies are being used in tandem to provide ID verification at Saudi Arabian cash machines.
Posted: 08 Feb 2021 | Published: 10 Oct 2019
|
|
|
6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER:
The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005
|
|
|
RFID Asset Management Solutions
sponsored by Motorola Solutions
WHITE PAPER:
RFID technology is helping to revolutionize asset management -from small packages to high dollar assets such as shipping containers or expensive IT equipment. Read this white paper to learn more.
Posted: 05 Jun 2007 | Published: 01 Jan 2007
|
|
|
Retail Fashion Market RFID Solutions
sponsored by Motorola Solutions
WHITE PAPER:
This whitepaper explains how Radio Frequency Identification (RFID) provides real-time inventory visibility so you can react quickly to inventory demand and stocking levels, helping ensure that the right product is available for your customers at the right
Posted: 22 Jul 2008 | Published: 01 Jan 2007
|
|
|
How Professional Services Add Value to Radio Frequency Identification (RFID) Projects
sponsored by Intermec
WHITE PAPER:
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers.
Posted: 04 Mar 2009 | Published: 04 Mar 2009
|
|
|
Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER:
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|