Approaches to Authentication
Jinfo Article
2nd September 2015
Abstract
Many organisations are struggling to decide on the best approach to authentication - we hear from Isabelle Garcia, an information manager who shares the decisions and conclusions she and her colleagues at wireless technology and innovation company Qualcomm arrived at... and how they made changes to their approach to authentication and worked with vendors and internal colleagues to implement those changes.
Content Access
Access to Jinfo Content and Community is available through a Jinfo Subscription.
Does your organisation have a Jinfo Subscription?
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Approaches to Authentication
- Link to this page
- View printable version
- Mini Review of Onelog - Electronic Resource Management
Tuesday, 1st September 2015 - Grappling with Authentication and Access in the Pharma Field
Wednesday, 1st July 2015
- Analysing Authentication Challenges & Approaches - FreePint Research
Thursday, 27th August 2015
Vendor adoption of AI
Community session
23rd May 2024
AI prompting and AI-sourcing, US private companies, and Jinfo on YouTube
Blog posting
10th April 2024
April 2024 Update
YouTube video
10th April 2024
- AI prompting and AI-sourcing, US private companies, and Jinfo on YouTube
10th April 2024 - AI practical actions, prompting and outsourcing
6th March 2024 - GenAI and ESG wisdom of the Jinfo crowd
13th February 2024
- Jinfo Community session (TBC) (Community) 16th July 2024
- Jinfo Community session (TBC) (Community) 20th June 2024
- Vendor adoption of AI (Community) 23rd May 2024