Association for Automatic Identification and Mobility Reports

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by SearchWinIT
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

SearchWinIT

Computer Weekly – 9 July 2013: The most influential women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Posted: 08 Jul 2013 | Published: 09 Jul 2013

ComputerWeekly.com

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 08 Feb 2021 | Published: 24 Oct 2019

ServiceNow

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks
EBOOK: Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 15 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Palo Alto Networks

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks & SHI
EBOOK: Tap into this the e-book to learn how you can easily and effectively protect your data center and hybrid cloud environments.
Posted: 08 Apr 2022 | Published: 09 Apr 2022

TOPICS:  .NET
Palo Alto Networks & SHI

Data Center and Hybrid Cloud Security
sponsored by Palo Alto and WWT
EBOOK: Tap into this the e-book to learn how you can easily and effectively protect your data center and hybrid cloud environments.
Posted: 12 Apr 2022 | Published: 12 Apr 2022

TOPICS:  .NET
Palo Alto and WWT

Data Center and Hybrid Cloud Security
sponsored by Palo Alto Networks and Presidio
EBOOK: Tap into this the e-book to learn how you can easily and effectively protect your data center and hybrid cloud environments.
Posted: 12 Apr 2022 | Published: 12 Apr 2022

TOPICS:  Cloud Security
Palo Alto Networks and Presidio

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Fast Track to E911 Compliance
sponsored by EverBridge Inc.
EBOOK: Check out this e-book for the 3 essential steps to take towards E911 compliance, and discover the tools you need to manage a project that will push your business towards compliance.
Posted: 06 Aug 2022 | Published: 06 Aug 2022

TOPICS:  .NET
EverBridge Inc.

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

Identity & Access Management for Financial Services
sponsored by Beta Systems
WHITE PAPER: The GARANCY IAM suite can help protect the business-critical information, data and applications of financial service companies from unsanctioned access. Download the solution brief to learn more about the GARANCY IAM suite.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TOPICS:  .NET
Beta Systems

Customer Identity Continuity: Why It’s Critical
sponsored by Daon
WHITE PAPER: Customer friction and fraud risks emerge where incompatible identification and authentication processes collide. Examine the most common pain points of these processes in this white paper.
Posted: 27 Jun 2022 | Published: 28 Jun 2022

TOPICS:  .NET
Daon

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

The 5 Fundamental Components Of A Secure Application Development Program
sponsored by SubRosa
WHITE PAPER: A secure development program is a structured process that allows for the rapid production of high-quality, low-cost software in the shortest amount of time possible. This white paper explores the fundamental elements of a secure application development program. Read on to get started.
Posted: 24 Jun 2022 | Published: 24 Jun 2022

TOPICS:  .NET
SubRosa

A Smart Approach to Protecting Content and Securing Desktops
sponsored by Dell
WHITE PAPER: Learn how Dell cloud client computing solutions can help your organization solve the data and access protection puzzle.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

How to Automate your CSMS for WP.29 Compliance
sponsored by Cybellum
WHITE PAPER: The new UNECE WP.29 regulation requires that automobile manufacturers implement a certified cybersecurity management system (CSMS) with any connected vehicle. As it stands, only 6% of organizations have everything set up for compliance. Read this white paper to learn more and take the first step towards UNECE WP.29 compliance
Posted: 20 Aug 2022 | Published: 20 Aug 2022

TOPICS:  .NET
Cybellum

Everything you need to know about successful AIDC
sponsored by SearchERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchERP

Ensuring seamless network integration with the virtual data center
sponsored by Softchoice Corporation
EBOOK: To reap all the benefits of server virtualization, data centers need to be able to work with Virtual Machines while still maintaining accessibility and keeping up with the security needed.
Posted: 30 Nov 2011 | Published: 29 Nov 2011

Softchoice Corporation

Providers of Verified Identity
sponsored by 1Kosmos
RESEARCH CONTENT: In this KuppingerCole Market Compass, you will discover an in-depth review and comparison of 21 of the most competitive vendors within the Verified Identity segment. It gives you all the vital information needed to decide which identity verification product best suits your enterprise needs.
Posted: 13 Aug 2022 | Published: 13 Aug 2022

TOPICS:  .NET
1Kosmos

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com