Association for Automatic Identification and Mobility Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by TechTarget Search Windows Server
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

TechTarget Search Windows Server

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Computer Weekly – 9 July 2013: The most influential women in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Posted: 08 Jul 2013 | Published: 09 Jul 2013

TechTarget ComputerWeekly.com

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola Solutions
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola Solutions

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks
EBOOK: Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 15 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Palo Alto Networks

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by TechTarget Security
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

TechTarget Security

A Smart Approach to Protecting Content and Securing Desktops
sponsored by Dell
WHITE PAPER: Learn how Dell cloud client computing solutions can help your organization solve the data and access protection puzzle.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Ensuring seamless network integration with the virtual data center
sponsored by Softchoice Corporation
EBOOK: To reap all the benefits of server virtualization, data centers need to be able to work with Virtual Machines while still maintaining accessibility and keeping up with the security needed.
Posted: 30 Nov 2011 | Published: 29 Nov 2011

Softchoice Corporation

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

3 Must-Have Modernization Strategies for Hospitals
sponsored by Airstrip Technologies
WHITE PAPER: Read this white paper to learn how hospitals are streamlining processes and implementing mobile technology that combines third-party integration, interoperability, and communications in ways that improve workflows and optimize staff efficiency.
Posted: 07 Mar 2024 | Published: 07 Mar 2024

TOPICS:  .NET
Airstrip Technologies

E-Book: NERC Compliance
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

TechTarget Security

Lawful Interception of Telecommunication Services
sponsored by Utimaco
PRODUCT OVERVIEW: Lawful Interception (LI) refers to the legally mandated surveillance of telecommunication services. The UTIMACO Lawful Interception Management System (LIMS) is a monitoring solution designed to help telecom operators and Internet service providers fulfill their legal obligation to Law enforcement agencies (LEAs). Download now to learn more.
Posted: 31 May 2023 | Published: 31 May 2023

TOPICS:  .NET
Utimaco

5g And Security
sponsored by Reply
WHITE PAPER: Supply chain risks, interdependencies with critical systems: these are two of the five major threats to 5G security that this white paper breaks down. To learn all about those dangers and how to face them, download the paper.
Posted: 25 Jul 2023 | Published: 25 Jul 2023

TOPICS:  .NET
Reply

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

Minimizing Cyber Risk with Better Threat Detection and Incident Response
sponsored by TechTarget Security
EZINE: Today's security incident response must cope with an increasing onslaught of sophisticated attacks. Learn how to automate and collaborate better on your organization's incident response through threat detection, IR tools, and more.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

TechTarget Security

Assess Mobile Devices Before Making a Management Plan
sponsored by TechTarget Mobile Computing
EBOOK: Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, applications and data. Mobile device management must account for who owns what and how it will be monitored and secured.
Posted: 04 Mar 2014 | Published: 06 Mar 2014

TechTarget Mobile Computing

Buyer's Guide to Cybersecurity Solutions
sponsored by Palo Alto Networks
WHITE PAPER: Risks are evolving, and so are solutions. Learn how to evaluate and select the best technology for your organization.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

TOPICS:  IT Management
Palo Alto Networks

Buyer's Guide: Cybersecurity
sponsored by Palo Alto Networks
RESOURCE: Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

Boost HIPAA Compliance With CyberArk Privileged Access Management Solutions
sponsored by Amazon Web Services
PRODUCT OVERVIEW: CyberArk's privileged access management (PAM) solutions enhance PHI security, manage privileged access, and support HIPAA compliance. Discover how its identity-centric method secures credentials, monitors sessions, and detects threats. Read this product overview to learn how CyberArk PAM lowers breach risks and proves compliance.
Posted: 12 Apr 2024 | Published: 12 Apr 2024

TOPICS:  .NET
Amazon Web Services