Association for Automatic Identification and Mobility White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Rethinking transport and logistics for the digital future
sponsored by Verizon
EBOOK: There are many variables to consider throughout any company’s logistics journey—future business requirements, process improvements and more. This e-book provides a 5-step roadmap for transforming your business’s logistics. Continue on and simplify your logistics transformation.
Posted: 28 Oct 2022 | Published: 29 Oct 2022

TOPICS:  .NET
Verizon

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks
EBOOK: Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 15 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

Identity & Access Management for Financial Services
sponsored by Beta Systems
WHITE PAPER: The GARANCY IAM suite can help protect the business-critical information, data and applications of financial service companies from unsanctioned access. Download the solution brief to learn more about the GARANCY IAM suite.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TOPICS:  .NET
Beta Systems

Customer Identity Continuity: Why It’s Critical
sponsored by Daon
WHITE PAPER: Customer friction and fraud risks emerge where incompatible identification and authentication processes collide. Examine the most common pain points of these processes in this white paper.
Posted: 27 Jun 2022 | Published: 28 Jun 2022

TOPICS:  .NET
Daon

Security Guide Zoom Video Communications, Inc.
sponsored by Zoom Video Communications
WHITE PAPER: Zoom places security as the highest priority in the operations of its suite of products and services. They strive to continually provide a robust set of security features and practices to meet the requirements of businesses for safe and secure collaboration. In this white paper, learn about the security features that are available with Zoom.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Zoom Video Communications

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

A Smart Approach to Protecting Content and Securing Desktops
sponsored by Dell
WHITE PAPER: Learn how Dell cloud client computing solutions can help your organization solve the data and access protection puzzle.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Ensuring seamless network integration with the virtual data center
sponsored by Softchoice Corporation
EBOOK: To reap all the benefits of server virtualization, data centers need to be able to work with Virtual Machines while still maintaining accessibility and keeping up with the security needed.
Posted: 30 Nov 2011 | Published: 29 Nov 2011

Softchoice Corporation

The 5 Fundamental Components Of A Secure Application Development Program
sponsored by SubRosa
WHITE PAPER: A secure development program is a structured process that allows for the rapid production of high-quality, low-cost software in the shortest amount of time possible. This white paper explores the fundamental elements of a secure application development program. Read on to get started.
Posted: 24 Jun 2022 | Published: 24 Jun 2022

TOPICS:  .NET
SubRosa

Everything you need to know about successful AIDC
sponsored by SearchERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchERP

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

Providers of Verified Identity
sponsored by 1Kosmos
RESEARCH CONTENT: In this KuppingerCole Market Compass, you will discover an in-depth review and comparison of 21 of the most competitive vendors within the Verified Identity segment. It gives you all the vital information needed to decide which identity verification product best suits your enterprise needs.
Posted: 13 Aug 2022 | Published: 13 Aug 2022

TOPICS:  .NET
1Kosmos

How to Automate your CSMS for WP.29 Compliance
sponsored by Cybellum
WHITE PAPER: The new UNECE WP.29 regulation requires that automobile manufacturers implement a certified cybersecurity management system (CSMS) with any connected vehicle. As it stands, only 6% of organizations have everything set up for compliance. Read this white paper to learn more and take the first step towards UNECE WP.29 compliance
Posted: 20 Aug 2022 | Published: 20 Aug 2022

TOPICS:  .NET
Cybellum

Eight Digital Best Practices For Sales Professionals
sponsored by DocuSign, Inc.
WHITE PAPER: Download this paper to explore 8 best practices that can help you digitize your sales teams and support the modern technologies they need for success.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Sales
DocuSign, Inc.

The Power Of Context: The Evolution Of Leadership Science And The Impact On Talent Mobility
sponsored by SHL US LLC
RESEARCH CONTENT: Access this white paper to discover key research insights that highlight why using context to enhance current approaches to leadership mobility decisions will leave organizations better placed to develop and deploy targeted, dynamic, agile and precise leadership strategies.
Posted: 10 May 2022 | Published: 10 May 2022

TOPICS:  .NET
All resources sponsored by SHL US LLC

5 Remedies for the top IT Pains
sponsored by ServiceNow
EBOOK: Access this e-book for 5 remedies to top IT pains, enabling you to gain true control of IT costs, scale IT support, drive productivity and deliver extraordinary experiences.
Posted: 28 Sep 2022 | Published: 26 Sep 2022

TOPICS:  .NET
ServiceNow