Association for Automatic Identification and Mobility Reports

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Computer Weekly – 9 July 2013: The most influential women in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Posted: 08 Jul 2013 | Published: 09 Jul 2013

TechTarget ComputerWeekly.com

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by TechTarget Search Windows Server
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

TechTarget Search Windows Server

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Rethinking transport and logistics for the digital future
sponsored by Verizon
EBOOK: There are many variables to consider throughout any company’s logistics journey—future business requirements, process improvements and more. This e-book provides a 5-step roadmap for transforming your business’s logistics. Continue on and simplify your logistics transformation.
Posted: 28 Oct 2022 | Published: 29 Oct 2022

TOPICS:  .NET
Verizon

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks
EBOOK: Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 15 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by TechTarget Security
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

TechTarget Security

A Smart Approach to Protecting Content and Securing Desktops
sponsored by Dell
WHITE PAPER: Learn how Dell cloud client computing solutions can help your organization solve the data and access protection puzzle.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

The 5 Fundamental Components Of A Secure Application Development Program
sponsored by SubRosa
WHITE PAPER: A secure development program is a structured process that allows for the rapid production of high-quality, low-cost software in the shortest amount of time possible. This white paper explores the fundamental elements of a secure application development program. Read on to get started.
Posted: 24 Jun 2022 | Published: 24 Jun 2022

TOPICS:  .NET
SubRosa

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Eight Digital Best Practices For Sales Professionals
sponsored by DocuSign, Inc.
WHITE PAPER: Download this paper to explore 8 best practices that can help you digitize your sales teams and support the modern technologies they need for success.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  Sales
DocuSign, Inc.

The Power Of Context: The Evolution Of Leadership Science And The Impact On Talent Mobility
sponsored by SHL US LLC
RESEARCH CONTENT: Access this white paper to discover key research insights that highlight why using context to enhance current approaches to leadership mobility decisions will leave organizations better placed to develop and deploy targeted, dynamic, agile and precise leadership strategies.
Posted: 10 May 2022 | Published: 10 May 2022

TOPICS:  .NET
All resources sponsored by SHL US LLC

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Ensuring seamless network integration with the virtual data center
sponsored by Softchoice Corporation
EBOOK: To reap all the benefits of server virtualization, data centers need to be able to work with Virtual Machines while still maintaining accessibility and keeping up with the security needed.
Posted: 30 Nov 2011 | Published: 29 Nov 2011

Softchoice Corporation

Everything you need to know about successful AIDC
sponsored by TechTarget ERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

TechTarget ERP

E-Book: NERC Compliance
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

TechTarget Security

How to Automate your CSMS for WP.29 Compliance
sponsored by Cybellum
WHITE PAPER: Automotive manufacturers know this to be true: They must comply with WP.29. So, what does WP.29 require? That, for any connected vehicle, manufacturers must implement a Cyber Security Management System (CSMS). This white paper explores how automating CSMS can prove beneficial for manufacturers. Continue reading to understand why.
Posted: 14 Mar 2023 | Published: 14 Mar 2023

TOPICS:  .NET
Cybellum

The Anomali Platform Cloud Native, Intelligence-Driven Extended Detection And Response (XDR)
sponsored by Anomali
DATA SHEET: The acceleration of digital transformation has not only expanded an organization’s attack surface, but it’s also increased the challenges security teams deal with on a daily basis. Access this data sheet to learn key capabilities of a cloud native extended detection and response (XDR) platform and more.
Posted: 24 May 2022 | Published: 29 Mar 2022

TOPICS:  .NET
Anomali

The Top 3 IT Pains Of The New Reality And How To Solve Them
sponsored by ServiceNow
EBOOK: The massive shifts in workforce and processes have revealed acute shortfalls in IT systems and approaches. Download this eBook to see how integrating operations management (ITOM) at the same time as ITSM can help mitigate key IT pain points in your organization.
Posted: 09 Mar 2022 | Published: 09 Mar 2022

TOPICS:  .NET
ServiceNow

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

The Need For Speed: How It Must Support The Digital Business
sponsored by SubRosa
WHITE PAPER: Gartner has recently defined a new category that converges network and security into a single cloud-based service: Secure access service edge (SASE). Simply put, SASE is the secure network for the future of your business. Read the full PDF to learn more about SASE and see how it is shaping the future of network security.
Posted: 17 Jun 2022 | Published: 17 Jun 2022

TOPICS:  .NET
SubRosa

Aml Modernization Embarking On The Journey
sponsored by SAS Institute
WHITE PAPER: Explore current organizational challenges and the benefits of new AML technology adoption in this white paper. Embark on a journey of discovery and modernization.
Posted: 02 Feb 2023 | Published: 03 Feb 2023

TOPICS:  .NET
SAS Institute