Association for Automatic Identification and Mobility

Association for Automatic Identification and Mobility Reports
Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Computer Weekly – 9 July 2013: The most influential women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil our list of the 25 most influential women in UK IT, and talk to the winner - Tech City CEO Joanna Shields. We hear from oil giant BP about how it moved to a hybrid cloud environment. And we examine the changing nature of the outsourcing market and what it means for IT managers.
Posted: 08 Jul 2013 | Published: 09 Jul 2013

ComputerWeekly.com

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by SearchWinIT
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

SearchWinIT

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Tip-Guide: Demand-driven supply chain innovations center on analytics, mobile ID
sponsored by SAP America, Inc.
EGUIDE: In this expert tip guide, readers will learn details around the recent advances in automatic identification and data capture (AIDC), especially item-level radio frequency identification (RFID) and smartphone-based social media and scanning applications for consumers, as well as new applications of supply chain analytics.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

SAP America, Inc.

Increase Productivity and Effectiveness of Merchandising Audits with the MC35
sponsored by Motorola, Inc.
WHITE PAPER: The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store.
Posted: 10 Jan 2008 | Published: 01 Mar 2007

Motorola, Inc.

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Inventory Management for a Global Supply Chain
sponsored by Apriso Corporation
EBOOK: To respond to the opportunities and challenges of globalization, manufacturers are looking to IT solutions that provide standardization and visibility into the materials that flow through production facilities. This e-book provides the buying tips and implementation advice manufacturers need to master inventory in the emerging global supply chain.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Apriso Corporation

Fixed Industrial Scanning and Machine Vision
sponsored by Zebra Technologies
WHITE PAPER: Warehousing, distribution, and fulfillment centers are facing higher volumes, faster fulfillment expectations, and continued labor shortage issues. Organizations need to modernize their operations to keep pace, and fast. Download this paper to learn how Zebra’s fixed industrial scanning and machine vision solutions can help.
Posted: 08 Feb 2022 | Published: 09 Feb 2022

TOPICS:  .NET
Zebra Technologies

The top 3 IT pains of the new reality and how to solve them with ITSM plus ITOM
sponsored by ServiceNow
WHITE PAPER: In today’s remote work environment, three common IT headaches have emerged. Inside this guide, unearth the causes of these pain points—and learn how to start solving them.
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ServiceNow

Accelerating Security Response
sponsored by ServiceNow
WHITE PAPER: While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Data Center & Hybrid Cloud Security
sponsored by Palo Alto Networks
EBOOK: Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.
Posted: 12 Mar 2021 | Published: 12 Mar 2021

TOPICS:  Security
Palo Alto Networks

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

A Comprehensive Ransomware Protection: Detection, Response, And Recovery
sponsored by Datto
EBOOK: Ransomware is typically distributed via a phishing email that tricks a user into clicking a link or downloading an attachment, which installs the malware on their system. Tap into this guide to learn how you can protect across all your devices and services with effective ransomware detection, response and recovery.
Posted: 10 May 2022 | Published: 10 May 2022

TOPICS:  .NET
Datto

Hunt Down Threats Faster
sponsored by BluVector
DATA SHEET: In this data sheet, learn how BluVector Automated Threat Hunting (ATH) is designed to give security operations teams actionable insights and solves common threat hunting challenges. Access now to learn about its 5 intended benefits.
Posted: 31 Mar 2022 | Published: 31 Mar 2022

TOPICS:  .NET
BluVector

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

Identity & Access Management for Financial Services
sponsored by Beta Systems
WHITE PAPER: The GARANCY IAM suite can help protect the business-critical information, data and applications of financial service companies from unsanctioned access. Download the solution brief to learn more about the GARANCY IAM suite.
Posted: 14 Dec 2021 | Published: 14 Dec 2021

TOPICS:  .NET
Beta Systems

A Technical Deep Dive Into AI Service Desk
sponsored by Aisera
WHITE PAPER: This paper takes a technical deep dive into AI service desks, covering current technical challenges, a look at Aisera’s AI service desks, key takeaways, and more.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Aisera

Zero-trust Solutions for Comprehensive Visibility and Control
sponsored by Fortinet, Inc.
DATA SHEET: Zero trust can improve security for nearly every part of the network. However, many vendors offer zero trust in piecemeal, which can create security gaps, increase costs and leave a platform cumbersome to manage. Download this solution brief to learn how Fortinet’s comprehensive zero trust aims to deliver steadfast protection and control.
Posted: 16 Sep 2021 | Published: 21 Jul 2021

TOPICS:  .NET
Fortinet, Inc.

Security Guide Zoom Video Communications, Inc.
sponsored by Zoom Video Communications
WHITE PAPER: Zoom places security as the highest priority in the operations of its suite of products and services. They strive to continually provide a robust set of security features and practices to meet the requirements of businesses for safe and secure collaboration. In this white paper, learn about the security features that are available with Zoom.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Zoom Video Communications

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

Protect Against Phishing with Microsoft Exchange and ServiceNow
sponsored by ServiceNow
RESOURCE: With the widespread use of phishing as a method of attack, SOC teams struggle to identify true phishing emails that have slipped through to users’ mailboxes and contain the threats they create. In this solution brief, discover how to protect against phishing with Microsoft Exchange and ServiceNow.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Pii Data Security In A Hybrid And Multicloud World
sponsored by Fortanix
WHITE PAPER: The exponential rise in the volume of data collected from social media, mobile devices, websites and various user tracking technologies has made securing personally identifiable information (PII) much more difficult. Download this white paper to explore strategies for how this can be done in an increasingly vulnerable cloud-driven world.
Posted: 09 Jul 2021 | Published: 09 Jul 2021

TOPICS:  .NET
Fortanix

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

A Smart Approach to Protecting Content and Securing Desktops
sponsored by Dell
WHITE PAPER: Learn how Dell cloud client computing solutions can help your organization solve the data and access protection puzzle.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

The Role of a Modern Enterprise DLP Solution in Facilitating GDPR Compliance
sponsored by Palo Alto Networks
WHITE PAPER: Organizations subject to GDPR must implement processes and security tools to rightfully handle, continuously protect and know the location of the information of EU residents. Read this white paper to learn how a modern data loss prevention (DLP) solution can serve as a backbone for maintaining GDPR compliance.
Posted: 28 Feb 2022 | Published: 01 Mar 2022

TOPICS:  .NET
Palo Alto Networks

Everything you need to know about successful AIDC
sponsored by SearchERP
EBOOK: This expert handbook provides overview and analysis of three main AIDC tracking technologies: bar codes, RFID, and GPS.
Posted: 07 Mar 2013 | Published: 07 Mar 2013

SearchERP