IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

Association for Automatic Identification and Mobility

RSS Feed   
Association for Automatic Identification and Mobility White Papers (View All Report Types)
 
8 Biggest Mistakes IT Practitioners Make
sponsored by Splunk
WHITE PAPER: Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

v
sponsored by ServiceNow
WHITE PAPER: To realize a greater return from the change portfolio, read this white paper, which discusses how adopting a Change and Governance Framework will renew IT's ability to become a true engine for driving business growth.
Posted: 25 Jan 2018 | Published: 01 Jan 2018

ServiceNow

How Support Services Can Simplify IT and Prevent Outages
sponsored by IBM
WHITE PAPER: It's estimated that the average cost of a data center outage amounts to over $740,000 – a nearly 40 percent increase from 2010 estimates. Find out how IT support services can help your data center continue running airtight without risking outages, and can tackle painful, yet all-too-common IT environment challenges.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

IBM

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TOPICS:  RFID | Security
ComputerWeekly.com

Top 5 Myths of Green-Screen Modernization
sponsored by Rocket Software
WHITE PAPER: There are ways to modernize green screen applications for modern users, but the journey is filled with myths about the difficulties you are likely to run into. Open this whitepaper to learn about 5 green screen modernization myths, and how you can modernize your green screen apps much more easily than you'd ever thought possible.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Rocket Software

Augmented Intelligence: Helping Humans Make Smarter Decisions
sponsored by Micro Focus
WHITE PAPER: Taking advantage of machine learning is massively beneficial for data-driven decision-making. Read this detailed white paper to find out if Micro Focus IDOL is the right choice for your organization.
Posted: 15 Jan 2019 | Published: 31 Dec 2018

Micro Focus

Transform Multichannel Data into Information with Capture Technology
sponsored by Hyland
WHITE PAPER: In this white paper, uncover how capture technology can help businesses classify and extract relevant data. Discover the role of automation, AI, and robotics in the capture process, and learn about the benefits of capture software and capture software's role in worldwide vertical markets.
Posted: 28 Mar 2019 | Published: 31 Dec 2018

Hyland

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

How Passive Monitoring Can Streamline NERC CIP Compliance
sponsored by Forescout
EBOOK: The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

AI to Better Engage your Digitally Connected Customer
sponsored by Avaya
PRODUCT OVERVIEW: Access this white paper to learn about Avaya AVA, an AI cloud system that leverages a Chat Bot and NLP to provide integration of social messaging and automation of digital interactions—making it easier to deliver personalized customer experiences.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

Avaya

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
PRODUCT OVERVIEW: Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Wireless Health: Powerful Heuristics for Smarter Troubleshooting
sponsored by Cisco Meraki
WHITE PAPER: Learn how Cisco Meraki's Wireless Health feature simplifies root cause analysis for all connected wireless clients in a single dashboard, enabling IT teams to proactively manage and answer complex questions without having to manually dig through the entire network stack.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Cisco Meraki

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Making the Move to Next-Generation Information Archiving
sponsored by Micro Focus
EBOOK: This buyer's e-book is designed to help you choose the right archiving solution for your enterprise. It'll guide you through every step of the process, so keep reading to view a checklist of must-have archiving capabilities, key questions to ask vendors, and tips on comparing platforms.
Posted: 18 Jan 2019 | Published: 31 Dec 2018

Micro Focus

Escaping the Traditional Role of IT for Something Better
sponsored by ServiceNow
WHITE PAPER: Open this whitepaper to learn how IT can escape its traditional role for something bigger with the help of intelligent and automated workflows – freeing up IT's time to focus on value-adding projects rather than manual maintenance tasks.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

ServiceNow

Cloud Visibility and Security for DevOps & SecOps Teams
sponsored by Ziften
WHITE PAPER: Moving a business-critical server or application to the cloud is not foolproof. System outages, data loss and more can, and do, occur due to misconfigurations, system failures, or security exploits. In this white paper, explore 6 common cloud visibility use cases encountered by DevOps and SecOps personnel on a regular basis.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Ziften

Secure Voting
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ComputerWeekly.com

Build Context-Aware Networks with this Smart Router
sponsored by 128 Technology
PRODUCT OVERVIEW: In this white paper, learn about 128 Technology's Session Smart Router, a modernized and secure routing model for building context-aware networks—which gives you the reliable application performance you need.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

128 Technology

Maximizing Port Safety
sponsored by Motorola, Inc.
WHITE PAPER: Business-critical communication systems are enabling ports to overcome the challenges and generate competitive edge through more efficient operations, safer working conditions and stronger security protection. In this resource, learn how Motorola Solutions can help your organization deliver secure port operations, as well as minimize risk.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Motorola, Inc.

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement