IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

Association for Automatic Identification and Mobility

RSS Feed    Add to Google    Add to My Yahoo!
Association for Automatic Identification and MobilityWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: Learn about big data technologies from world-renowned thought leader on big data and business analytics, Thomas H. Davenport.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

SAS

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

Restore Balance with Next Generation Authentication Technical Guide
sponsored by SearchSecurity.com
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

SearchSecurity.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Federated Identity & Single Sign‐On Using Layer 7
sponsored by CA Technologies.
WHITE PAPER: In this white paper, learn how separate identity silos create gaps and complexities in security measures. Read on to reveal a solution that federates identity and provides single sign-on (SSO) services for mobile and virtual applications to reduce these challenges.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Guide to Mobile Device Management Software
sponsored by SearchSecurity.com
EGUIDE: This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

The next generation of firewalls for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

Transforming the Mobile Experience with Cisco Wireless Location Services
sponsored by Cisco India
WHITE PAPER: This white paper describes a variety of use cases for Cisco's Connected Mobile Experiences (CMX) platform, which collects location-related data that businesses can use to create innovative user services and enhance the customer experience.
Posted: 18 Jul 2014 | Published: 31 Jul 2013

Cisco India

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

October Essentials Guide on Mobile Device Security
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Making Smarter Mobile Access Decisions
sponsored by Dell Software
WHITE PAPER: Mobile devices can represent a significant threat to corporate data. Find out what IT departments need to know before deciding on a smartphone and tablet platform that is safe, easy to configure, and flexible enough to meet the needs of employees and senior executives alike.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Dell Software

Applications and best practices to keep your mobile devices secure
sponsored by SearchSecurity.com
EGUIDE: Uncover best practices for keeping your mobile devices and applications secure.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

SearchSecurity.com

The Truth About Mobile Business Intelligence
sponsored by Information Builders
WHITE PAPER: Mobile business intelligence (BI) is not a new concept, but the rumors that it's too complex, cumbersome, expensive, and limited have prevented most organizations from making the investment. Access this exclusive paper to uncover the 5 most common mobile BI myths debunked and how mobile BI can help you gain a competitive advantage.
Posted: 02 Aug 2012 | Published: 01 Aug 2012

Information Builders

Handbook: Identity and Access Management
sponsored by SearchSecurity.com
EBOOK: This Tech Guide on identity and access management (IAM) from SearchSecurity.com outlines the issues associated with IAM programs, how to build an effective strategy, why privilege creep has become such a challenge, and more!
Posted: 26 Jul 2013 | Published: 26 Jul 2013

SearchSecurity.com

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Enabling Enterprise Mobility Through People-Centric IT
sponsored by Data#3
WHITE PAPER: This extensive whitepaper covers how IT must shift to a people-centric approach as they handle the security and compliance challenges presented by emerging trends.
Posted: 21 May 2014 | Published: 21 May 2014

Data#3

Consumerization 101: Defining & Enforcing a Successful BYOD Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

SearchSecurity.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

SearchSecurity.com

A Quick-Start Guide to Deploy an SMS Strategy for Business
sponsored by StrikeIron
WHITE PAPER: SMS is emerging as one of the most effective means of communication -- short, digestible messages sent rapidly to the right users. In this white paper, you'll find a 4-step guide to deploying an SMS strategy for customer relationship management (CRM) and marketing.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

StrikeIron

Delivering Enterprise Information Securely on Android and Apple iOS Devices
sponsored by Citrix Systems, Inc.
WHITE PAPER: Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions – and the steps you should take to maintain security and control.
Posted: 10 Oct 2012 | Published: 01 Jun 2014

Citrix Systems, Inc.

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security
sponsored by SearchSecurity.com
EZINE: In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

SearchSecurity.com

Journey 2016: Enterprise without boundaries
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from Atos assess how major trends including the birth of the total data economy, a cashless society, social and shared innovation will start to reshape business and society by 2016.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Small Cells, Big Challenge: A Definitive Guide to Designing and Deploying HetNets
sponsored by Ixia
WHITE PAPER: Network operators are under pressure to enhance network coverage, reliability, and capacity, while increasing the quality of the mobile experience. Heterogeneous networks (HetNets) -- more diversified access networks -- are emerging as a strategy to bridge the cost and capacity gap and meet demand.
Posted: 04 Mar 2014 | Published: 30 Nov 2013

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement