IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

Association for Automatic Identification and Mobility

RSS Feed   
Association for Automatic Identification and Mobility White Papers (View All Report Types)
 
8 Biggest Mistakes IT Practitioners Make
sponsored by Splunk
WHITE PAPER: Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

5 Steps To Accelerate Value From Your Industrial IoT Data
sponsored by SAS
WHITE PAPER: How do you turn your IIoT data into a competitive advantage for your business? Inside, explore 5 steps proven to help you accelerate value from your IIoT data, and discover why should consider SAS Analytics for your IoT needs.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

SAS

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Building trust in the security of RFID systems
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TOPICS:  RFID | Security
ComputerWeekly.com

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

Managing Fraud Risk in the Digital Age
sponsored by SAS
WHITE PAPER: Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

SAS

Transform Multichannel Data into Information with Capture Technology
sponsored by Hyland
WHITE PAPER: In this white paper, uncover how capture technology can help businesses classify and extract relevant data. Discover the role of automation, AI, and robotics in the capture process, and learn about the benefits of capture software and capture software's role in worldwide vertical markets.
Posted: 28 Mar 2019 | Published: 31 Dec 2018

Hyland

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

TITUS Intelligent Protection
sponsored by TITUS
PRODUCT OVERVIEW: TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.
Posted: 17 May 2019 | Published: 17 May 2019

TITUS

Single Secure Credential to Access Facilities and IT Resources
sponsored by HID Global
PRODUCT OVERVIEW: Organizations that want to secure access to their premises, applications and networks run into significant challenges. Unfortunately, the technology to address those issues can sometimes require products from up to 12 different vendors. Download this product overview to learn about HID PIV and how it can address all those challenges.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

HID Global

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

Security Gets Smart with AI
sponsored by Blackberry Cylance
ANALYST REPORT: In this research report, explore key findings from a SANS survey of cybersecurity professionals who are involved with or interested in the use of AI for improving the security of their organization.
Posted: 09 Aug 2019 | Published: 31 Mar 2019

Blackberry Cylance

Key Considerations for Selecting an Industrial Cybersecurity Solution for Asset Identification, Threat Detection, and Response
sponsored by Dragos
WHITE PAPER: In this white paper, discover the considerations organizations should take into account when researching ICS cybersecurity platforms and assess the best solution for your industrial operations.
Posted: 02 Aug 2019 | Published: 08 Jan 2019

Dragos

Digital Transformation: Removing Adoption Barriers to Cloud Content Services
sponsored by Hyland
WHITE PAPER: When it comes to potentially disrupting critical data and processes that keep a business running smoothly, some ask if the risk of moving an on-premises enterprise content management system is worth the rewards. This white paper highlights the benefits and advantages of migrating content management to a cloud-based content services approach.
Posted: 30 Apr 2019 | Published: 31 Mar 2019

Hyland

Claroty A New Platform For OT Cybersecurity
sponsored by Claroty
PRODUCT OVERVIEW: Ensuring the security of industrial control systems (ICS) and the prevention or detection of cyberattacks and events is of increasing importance to users of these systems. In this white paper, learn about the Claroty platform which represents an innovative approach to addressing the specific challenges associated with cybersecurity in ICS.
Posted: 26 Sep 2019 | Published: 30 Sep 2016

Claroty

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Trends in packing and obfuscation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how two modern malware methods fit into today's landscape of advanced persistent threat and cyber crime as a service, and what the security industry can do to defend against them.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Cloud Visibility and Security for DevOps & SecOps Teams
sponsored by Ziften
WHITE PAPER: Moving a business-critical server or application to the cloud is not foolproof. System outages, data loss and more can, and do, occur due to misconfigurations, system failures, or security exploits. In this white paper, explore 6 common cloud visibility use cases encountered by DevOps and SecOps personnel on a regular basis.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Ziften

Build Context-Aware Networks with this Smart Router
sponsored by 128 Technology
PRODUCT OVERVIEW: In this white paper, learn about 128 Technology's Session Smart Router, a modernized and secure routing model for building context-aware networks—which gives you the reliable application performance you need.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

128 Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement